home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Magazine==
-
- Volume Five, Issue Forty-Five, File 14 of 28
-
- ****************************************************************************
-
- Updated Last : 3.14.1994
- Late Night Hack Announcement #4.2
-
- XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement
- XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement
- XXXXXXxxxxxxXXXXXX X X DEF CON II Convention Update Announcement
- XXXXXxxxxxxxxXXXXXXX X DEF CON II Convention Update Announcement
- XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON II Convention Update Announcement
- XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON II Convention Update Announcement
- XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON II Convention Update Announcement
- XXXxxxxxxxxxxxxXXXXXXXX DEF CON II Convention Update Announcement
- XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON II Convention Update Announcement
- XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON II Convention Update Announcement
- XXXXXXxxxxxxXXXXXXXXX X DEF CON II Convention Update Announcement
- XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement
- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement
-
- READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE
-
- =============================================================================
-
- What's this? This is an updated announcement and invitation to DEF CON II,
- a convention for the "underground" elements of the computer culture. We try
- to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
- Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
- Groups, CypherPunks, Futurists, Artists, Etc..
-
- WHO: You know who you are, you shady characters.
- WHAT: A convention for you to meet, party, and listen to some speeches
- that you would normally never hear.
- WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th)
- WHERE: Las Vegas, Nevada @ The Sahara Hotel
-
- So you heard about DEF CON I, and want to hit part II? You heard about the
- parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
- check it out in person? Load up your laptop muffy, we're heading to Vegas!
-
- Here is what Three out of Three people said about last years convention:
-
- "DEF CON I, last week in Las Vegas, was both the strangest and the best
- computer event I have attended in years." -- Robert X. Cringely, Info World
-
- "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas
-
- "Soon we were at the hotel going through the spoils: fax sheets, catalogs,
- bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds.
- The documents disappeared in seconds." -- Gillian Newson, New Media Magazine
-
- DESCRIPTION:
-
- Last year we held DEF CON I, which went over great, and this year we are
- planning on being bigger and better. We have expanded the number of
- speakers to included midnight tech talks and additional speaking on Sunday.
- We attempt to bring the underground into contact with "legitimate" speakers.
- Sure it's great to meet and party with fellow hackers, but besides that we
- try to provide information and speakers in a forum that can't be found at
- other conferences.
-
- While there is an initial concern that this is just another excuse for the
- evil hackers to party and wreak havoc, it's just not the case. People come
- to DEF CON for information and for making contacts. We strive to distinguish
- this convention from others in that respect.
-
- WHAT'S NEW THIS YEAR:
-
- This year will be much larger and more organized (hopefully) than last year.
- We have a much larger meeting area, and have better name recognition.
- Because of this we will have more speakers on broader topics. Expect
- speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new
- things expected include:
-
- > An Internet connection with sixteen ports will be there, _BUT_ will only
- provide serial connections because terminals are too hard to ship. So
- bring a laptop with communications software if you want to connect to the
- network. Thanks to cyberlink communications for the connection.
-
- > There will be door prizes, and someone has already donated a Cell Phone
- and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead Addict.
-
- > Dr. Ludwig will present his virus creation awards on Sunday.
-
- > A bigger and better "Spot The Fed" contest, which means more shirts to
- give away.
-
- > More room, we should have tables set up for information distribution.
- If you have anything you want distributed, feel free to leave it on the
- designated tables. Yes, this year there will be a true 24 hour
- convention space.
-
- > A 24 hour movie / video suite where we will be playing all type of stuff.
- VHS Format. Mail me with suggested titles to show, or bring your own.
- We'll use a wall projector when not in use by speakers.
-
- > Midnight Tech Talks on Friday and Saturday night to cover the more
- technical topics and leave the days free for more general discussions.
-
- WHO IS SPEAKING:=============================================================
-
- This list represents almost all of the speakers verified to date. Some
- people do not want to be announced until the event for various reasons, or
- are waiting for approval from employers. A speaking schedule will go out
- in the next announcement.
-
-
- Philip Zimmerman, Notorious Cryptographer & Author of PGP.
-
- Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and
- "Computer Viruses, Artificial Life and Evolution"
-
- Loyd Blankenship (The Mentor), Net Running in the 90's and RPG.
-
- Padgett Peterson, Computer Enthusiast, Anti-Virus Programmer.
-
- The Jackal, A Radio Communications Overview, Digital Radio and the Hack Angle.
-
- Judi Clark, Computer Professionals for Social Responsibility.
-
- Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced.
-
- To be Announced, The Software Publishers Association, Topic to be Announced.
-
- Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics.
-
- Mark Lotter, Cellular Enthusiast, Hacking Cell Phones.
-
- Lorax, The Lighter Side of VMBs.
-
- Peter Shipley, Unix Stud, Q&A on Unix Security.
-
- George Smith, Crypt Newsletter, Virus Topic to be Announced.
-
- Cathy Compton, Attorney, Q&A Surrounding Seizure Issues, Etc.
-
- John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal.
-
- Red Five & Hellbender, Madmen With a Camcorder, Who Knows?
-
- Erik Bloodaxe, Phrack Editor, Wierd Wireless Psycho Shit.. Stay Tuned..
-
- There should be a few round table discussions on Virus, Cellular, Unix and
- something else surrounding the industry.
-
- I'll name the rest of the speakers as they confirm. I'm still working on
- a few (Two?) people and groups, so hopefully things will work out and I can
- pass the good news on in the next announcement, or over our List Server.
-
- ============================================================================
-
- WHERE THIS THING IS:
-
- It's in Las Vegas, the town that never sleeps. Really. There are no clocks
- anywhere in an attempt to lull you into believing the day never ends. Talk
- about virtual reality, this place fits the bill with no clunky hardware. If
- you have a buzz you may never know the difference. It will be at the Sahara
- Hotel. Intel is as follows:
-
- The Sahara Hotel: 1.800.634.6078
-
- Room Rates: Single/Double $55, Triple $65, Suite $120
- (Usually $200) + 8% tax
-
- Transportation: Shuttles from the airport for cheap.
-
- NOTE: Please make it clear you are registering for the DEF CON II
- convention to get the room rates. Our convention space price is
- based on how many people register. Register under a false name if
- it makes you feel better, 'cuz the more that register the better for
- my pocket book. No one under 21 can rent a room by themselves, so
- get your buddy who is 21 to rent for you and crash out. Try to contact
- people on the Interactive Mailing List (More on that below) and
- hook up with people. Don't let the hotel people get their hands on
- your baggage, or there is a mandatory $3 group baggage fee. Vegas
- has killer unions.
-
- OTHER STUFF:
-
- I'll whip up a list of stuff that's cool to check out in town there so if for
- some reason you leave the awesome conference you can take in some unreal
- sites in the city of true capitalism. If anyone lives in Las Vegas, I
- would appreciate it if you could send a list of some cool places to check out
- or where to go to see the best shows and I'll post it in the next
- announcement or in the program
-
- -> I am asking for people to submit to me any artwork, pictures, drawings,
- logos, etc. that they want me to try and include in this years program.
- I am trying to not violate any copyright laws, but want cool shit. Send
- me your art or whatever and I'll try and use it in the program, giving you
- credit for the work, of course. Please send it in .TIF format if it has
- more than eight bit color. The program will be eight bit black and white,
- -> in case you want to make adjustments on your side.
-
-
- PLEASE DONATE "STUFF" FOR THE GIVEAWAY:
-
- We are trying to raffle off interesting and old functional items. If
- you have anything such as old computers, modems, weird radio stuff, books,
- magazines, etc that you want to get rid of, please call or mail me with
- what it is, or bring it along. I don't want to waste peoples time giving
- away rubber bands or anything, but pretty much anything else will go.
-
- *** NEW MAILING LIST SERVER ***
-
- We've finally gotten Major Domo List Serv software working (Kinda) and it
- is now ready for testing. MTV spent a lot of time hacking this thing to work
- with BSDi, and I would like to thank him. The purpose of the list is to
- allow people interested in DEF CON II to chat with one another. It would
- be very useful for people over 21 who want to rent hotel space, but split
- costs with others. Just mention you have room for 'x' number of people, and
- I'm sure you'll get a response from someone wanting to split costs. Someone
- also suggested that people could organize a massive car caravan from Southern
- Ca. to the Con. My attitude is that the list is what you make of it. Here
- are the specifics:
-
- Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to
- technical problems, etc. I'll do another mass mailing to everyone letting
- them know that the list is up and how to access it. Sorry for the delay!
-
-
- MEDIA:
-
- Some of the places you can look for information from last year include:
-
- New Media Magazine, September 1993
- InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely
- Gray Areas Magazine, Vol 2, #3 (Fall 1993)
- Unix World, ???,
- Phrack #44, #45
-
- COST:
-
- Cost is whatever you pay for a hotel room split however many ways, plus
- $15 if you preregister, or $30 at the door. This gets you a nifty 24 bit
- color name tag (We're gonna make it niftier this year) and your foot in the
- door. There are fast food places all over, and there is alcohol all over
- the place but the trick is to get it during a happy hour for maximum
- cheapness.
-
- ============================================================================
-
- I wanted to thank whoever sent in the anonymous fax to Wired that
- was printed in issue 1.5 Cool deal!
-
- =============================================================================
-
- FOR MORE INFORMATION:
-
- For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com
- in /pub/defcon. There are digitized pictures, digitized speeches and text
- files with the latest up to date info available.
-
- For email users, you can email dtangent@defcon.org for more information.
-
- For non-net people call:
-
- ---- A L L I A N C E ----
- SysOp Metalhead
- One Thousand One Hundred Megabytes Online
- 612.251.8596 USRobotics 16.8 Dual Standard
- Synchronet Multinode BBS Software
- International Informational Retrieval Guild (IIRG) Distro Site
- Electronic Frontier Foundation (EFF) MEMBER
- American Bulletin Board Association (ABBA) MEMBER
- -----------------------------------------------------------------------
- o 200+ Message bases. No post call ratio. Nope, not ever.
- o FidoNet [1:282/8004]
- o CyberCrime international [69:4612/2]
- o International Networked message ECHO areas:
- UFO, VIRUS, REPTILE, MUSIC, Twin Cities Chat, NORML, Telephone Watch,
- TRADEWARS, MONTE PYTHON, FCC, NO PIRACY, CLASSIFIEDS
- BBS Software & SYSOP Support, MUSIC, FISHING/HUNTING, Stephen King,
- Programming, Computers, Foreign Language, iCE/ACiD/TRiBE, COLLEGE
- LIVING, POLITICS, POETRY, RACISM, and too many more to mention
- o Computer Underground Magazines, History, Updates & Text
- o DEF CON Mirrior Archive
- o uXu, PHANTASY, CuD, EFF Magazine(s) Distro Site
- o Internet email mailbox (your.name.here@f8004.n282.z1.fidonet.org)
- o 30 day FULL ACCESS Trial Account...$10/year MEMBERship (sub. to change)
- -----------------------------------------------------------------------
-
- For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102,
- Seattle, WA, 98112
-
- For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone.
-
- A DEF CON Mailing list is maintained, and the latest announcements are mailed
- automatically to you. If you wish to be added to the list just send email
- to dtangent@defcon.org.
-
- =============================================================================
-
- (Note, I have put a copy of Dr. Ludwig's new KOH Data security encryption
- Virus online at the DEF CON ftp site in /pub/defcon/KOH along with full
- documentation. Get CrAzY.)
-
-
- VIRUS CREATION AWARDS:
-
- Announcing
- The
- Second International Virus Writing Contest
- Sponsored by
- American Eagle Publications, Inc. P.O. Box 41401
- Tucson, AZ 85717 USA
- and
- The Crypt Infosystems BBS
- +1 (818) 683-0854
-
- *** The Goal ***
-
- The purpose of this contest is to write a fully functional computer virus that
- entertains people with political satire. Viruses will be judged on the basis
- of originality, creativity, functionality, and political incorrectness.
-
- *** Eligibility ***
-
- Anyone who can write a computer virus is eligible.
-
- *** Contest Dates ***
-
- The contest is underway from January 1, 1994 until June 30, 1994. Your
- submissions must be received by June 30 to qualify. The winner of the
- contest will be announced at the DEFCON conference in Las Vegas, July 22-24,
- 1994. If you can be present, an official award will be bestowed on you at
- that time.
-
- *************************************************************
-
- Details
-
- *************************************************************
-
- The philosopher Friedrik Nietzsche once said that if you want to kill
- something, you must laugh at it--and laugh at it deeply. So there should be
- little wonder that political satire is as old as politics itself.
-
- Is there something going on in the political arena that you abhor, that makes
- you sick, that is just plain wrong? Well, here's your chance to make a
- mockery of it. I've always had this idea that if someone wrote a sufficiently
- witty virus that really addressed the issues the way the people (not the
- press, not the politicians) saw them, it might just get passed around by
- people voluntarily.
-
- Let's find out.
-
- Write a virus that is itself a political satire. I don't mean a virus that
- simply displays a message. I mean a living entity whose every move--whose
- every action--is politically motivated. If you need more than one virus to
- make your point--perhaps two viruses working together, or something like that,
- that is fine.
-
- -----------------------------------------------------------
- Let me give you a simple example: The Political Correctness Virus
-
- This virus is a spoof on the "political correctness" movement--which is just
- a form of self-imposed censorship--that is sweeping American intellectual
- circles, particularly colleges and universities.
-
- This virus is a memory resident boot sector virus which maintains a list of
- politically incorrect words on your computer system. It also hooks the
- keyboard interrupt and monitors every keystroke you make. If you type a
- politically incorrect word into the computer, the PCV springs into action.
-
- Politically incorrect words are ranked at three different offense levels.
- When the PCV encounters such a word, it determines what offense level that
- word is, and acts accordingly.
-
- The least offensive words merely register a beep. More offensive words cause
- a beep to sound for 10 seconds. The most offensive words cause a siren to
- sound for two minutes, locking the system for that duration. If you turn the
- computer off before the two minutes are up, the virus will stop the boot
- process for five minutes, with sirens, when you turn it back on. If you allow
- the siren to complete, then you can proceed.
-
- The virus has two different word lists, both stored in an encrypted and
- compressed format. The list is selected at random when the system is
- infected, after which it cannot be changed. The first list is the "proper"
- list of political correctness no-no's. For example, a word like "sodomite" is
- among the worst possible offenses. The second list is an inverted list of
- no-no's. This list trys to force you to use "sodomite" by flagging words
- like "gay" and "homosexual" as no-no's.
-
- If you allow the PCV to live in your system for three months without getting
- a single flag, you are given the supreme honor of viewing the word list
- assigned to you and adding a word to it. If you get more than 3000 flags in
- a lifetime, the virus will force you to enter a politically correct word
- before allowing you to start the computer, since you are obviously unwilling
- to submit to its censorship.
-
- The virus also uses powerful means to prevent disinfection, so that, once you
- get it, you can't get rid of it without a major effort.
-
- ------------------------------------------------------------
-
- Now, I know you can get a lot more creative than this--so do it! Design your
- virus carefully, so that everything it does has meaning. Then send it in.
-
- Here are the criteria we'll use:
-
- 1. Originality: Your virus must be an original work. Do not send us anything
- that is not 100% yours. Your message should be original too. Do not just
- ape what everybody else is saying, especially the media. Also, a refined wit
- is much to be preferred over vulgarity. Vulgarity is a substitute for
- original wit. Foul language, porn, etc., are out. Destructive features should
- be incorporated only if they are VERY appropriate (perhaps if you are
- commenting on real live genocide in your country, or something like that).
- In general, though, destructive features will hurt you, not help you. The one
- exception is modifying anti-virus programs. That is considered to be
- CONstructive activity.
-
- 2. Creativity: Make us laugh, make us cry. Amaze us with how bits and bytes
- can say something about politics and issues. Think of it like this:
- displaying a message on the screen is like reading a text file. What we want
- is the equivalent of a multi-media extravaganza. Use all the system's
- resources to tell your message. Don't be afraid to write a virus that has
- some weird mode of infecting programs that tells a story, or to write one
- that sends faxes to the White House, or sends an automatic request for reams
- of free information to some government agency.
-
- 3. Functionality: The virus has to work. If it only works on some machines,
- or under some versions of DOS, or what-not, then that will count against
- you. The better it is at infecting systems and moving around, the better off
- you will be. So, for example, if you write a file-infector, make sure it can
- jump directories, and--if you're up to it--migrate across a network.
-
- 4. Political incorrectness: Since computer viruses are politically incorrect,
- their message should be too. If you send us a pro-establishment virus, then
- you will not win this contest. A word to the wise: think twice about what's
- correct and what's not. Many positions are only superficially incorrect,
- though they are really quite fashionable among the establishment. Look at it
- this way: if you could get a well-written letter expressing your view
- published in a big city newspaper, then it's not sufficiently incorrect.
- There are a LOT of ideas that are unofficially censored by society--
- especially the media and academia. They tend to make themselves out to be the
- rebels, but they are really the establishment. If you can't think of anything
- creatively incorrect and sufficiently obnoxious then you shouldn't be writing
- viruses in the first place.
-
- *************************************************************
-
- How to Submit an Entry
-
- You may mail your entry to American Eagle Publications at the above address,
- or you may e-mail it to ameagle@mcimail.com. Alternatively, you can submit it
- by dialing the Crypt Infosystems BBS and uploading it there. To get on to the
- system quickly, efficiently and anonymously, log on as VIRUS, using the
- password CONTEST.
-
- An entry consists of:
-
- 1. A complete copy of your virus, both source and executable files.
-
- 2. If the political satire isn't perfectly obvious, send a verbal description
- of how the virus works and why it does what it does. This is especially
- important if you are not an American and you are commenting on something that
- has not received worldwide attention. I don't care if you're Bulgarian and
- you're commenting on something we've never heard of--just make sure you
- explain it, or we won't understand and you'll lose.
-
- 3. If you want to be recognized for your work, include your name (real or
- handle), and a way we can get in contact with you.
-
- By submitting an entry, you grant American Eagle Publications, Inc. the right
- to publish your virus in any form. You agree not to make your virus public
- prior to July 25, 1994. If you do, you are automatically disqualified from
- the contest.
-
- For the sake of privacy, you may encrypt your entry and send it in with the
- following PGP key (which we highly recommend if you have PGP):
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.1
-
- mQCNAi09jVgAAAEEAN3M9LFQXeBprkZuKo5NtuMC+82qNd3/8saHLO6iuGe/eUai
- 8Vx7yqqpyLjZDGbAS7bvobrcY3IyFeu8PXG4T8sd+g81P0AY0PHUqxxPG3COvBfP
- oRd+79wB66YCTjKSwd3KVaC7WG/CyXDIX5W6KwCaGL/SFXqRChWdf2BGDUCRAAUR
- tApDT05URVNUXzk0
- =Z20c
- -----END PGP PUBLIC KEY BLOCK-----
-
- Good luck!
-
- ****************************************************************
-
- P R I Z E S
-
- In addition to instant worldwide fame and recognition, you'll get:
-
- 1. A cash prize of $100 US.
-
- 2. A year's subscription to Computer Virus Developments Quarterly.
-
- 3. Your virus will be published in Computer Virus Developments Quarterly,
- and other fine journals.
-
- 4. A handsome engraved plaque recognizing your contribution to the betterment
- of mankind.
-
- 5. A free secret surprise that we cannot tell you about right now, valued
- at $100.
-
- Two runner-ups will receive the secret surprise.
-
- !! GO FOR IT !!
-
-
- =============================================================================
-
- STUFF TO SPEND YOUR MONEY ON:
-
- > Tapes of last years speakers (four 90 minute tapes) are available for $20
-
- > DEF CON I tee-shirts (white, large only) with large color logo on the
- front, and on the back the Fourth Amendment, past and present. This is
- shirt v 1.1 with no type-o's. These are $20, and sweatshirts are $25.
-
- > DEF CON II tee-shirts will be made in various colors this year, including
- a few long sleeve shirts. Sizes will be in XL only again, with few white
- larges made. Shirts will be $15, Long Sleeve $17, Sweat shirts will be $20.
- Well, actually, I'll make a small quantity of various stuff, so with luck
- you'll find something you like.
-
- > We will have a few (ten maybe?) embroidered hats with this years logo.
- Not sure how much they will be.. like $10 maybe.
-
- > Full sized 4 color DEF CON II wall posters will be for sale for about $5.
-
- > Pre-Register for next year in advance for $15 and save half.
-
- > Make all checks/money orders/etc. out to DEF CON, and mail to the address
- above. Way above. Above the virus awards announcement.
-
- If you have any confidential info to send, use this PGP key to encrypt:
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.3
-
- mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo
- dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf
- uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ
- hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50
- IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
- =ko7s
- -----END PGP PUBLIC KEY BLOCK-----
-
- - The Dark Tangent
-
-