home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 57.3 KB | 1,746 lines |
- ==Phrack Magazine==
-
- Volume Six, Issue Forty-Seven, File 3 of 22
-
-
- // // /\ // ====
- // // //\\ // ====
- ==== // // \\/ ====
-
- /\ // // \\ // /=== ====
- //\\ // // // // \=\ ====
- // \\/ \\ // // ===/ ====
-
- PART I
-
- ------------------------------------------------------------------------------
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
-
-
-
- Phrack Magazine and Computer Security Technologies proudly present:
-
- The 1995 Summer Security Conference
-
- SSSS U U M M M M EEEEE RRRR CCCC OOOO N N
- S U U MM MM MM MM E R R C O O NN N
- SSS U U M M M M M M M M EEE RRRR C O O N N N
- S U U M M M M M M E R R C O O N NN
- SSSS UUUU M M M M EEEEE R R CCCC OOOO N N
-
- "SUMMERCON"
-
- June 2-4 1995 @ the Downtown Clarion Hotel in Atlanta, Georgia
-
- This is the official announcement and open invitation to the 1995
- incarnation of Summercon. In the past, Summercon was an invite-only
- hacker gathering held annually in St. Louis, Missouri. Starting
- with this incarnation, Summercon is open to any and all interested
- parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators,
- Law Enforcement Officials, Neo-Hippies, Secret Agents, Teachers,
- Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers,
- Programmers, Conspiracy Nuts, Musicians and Nudists.
-
- LOCATION:
-
- The Clarion Hotel is located in downtown Atlanta, 9 miles from
- Hartsfield International Airport and just a few blocks from the
- Peachtree Center MARTA Station.
-
-
- Considering the exorbitant expenses involved with attending other
- conferences of this type, Rooms at Summercon are reduced to
-
- $65 per night for Single or Double Occupancy
-
- The Clarion Hotel Downtown, Courtland at 70 Houston St., NE,
- Atlanta, GA 30303
- (404) 659-2660 or (800) 241-3828 (404) 524-5390 (fax)
-
-
- No one likes to pay a hundred dollars a night. We don't expect you
- to have to. Spend your money on room service, drinks in the hotel bar,
- or on k-rad hacker t-shirts. Remember: Mention that you are attending
- Summercon in order to receive the discount.
-
- DIRECTIONS
-
- 75/85 Southbound - Exit 97 (Courtland). Go 3 blocks south on Courtland
- then turn left on Houston (John Wesley Dobbs Ave.)
- 20 East - Exit 75/85 North at International. Turn Left on Courtland at
- Houston Ave. NE. (aka. John Wesley Dobbs Ave. NE.)
- 20 West - Exit 75/85 North at International. One block to Courtland
- and right at Houston Ave. NE. (John Wesley Dobbs Ave. NE.)
-
- Atlanta Airport Shuttle - The Express Bus that leaves from Atlanta's
- International Airport will drop you off at many hotels in the downtown
- area, including the Clarion. The shuttle should be no more than 12
- dollars. Fares may be paid at the Airport Shuttle in the Ground
- Transportation area of the Airport Terminal.
-
- MARTA - The Metropolitan Atlanta Rapid Transit Authority (MARTA), is a
- convenient and inexpensive way to negotiate most of the Atlanta area.
- Take the MARTA train from the Airport to the Peach Tree Center Station.
- Walk three blocks down Houston to the intersection of Houston and
- Courtland. The MARTA fare will be roughly 2 dollars.
-
- Taxis - The average cab fare from Atlanta's Airport to the downtown area
- is roughly 30 dollars.
-
- CONFERENCE INFO
-
- It has always been our contention that cons are for socializing.
- "Seekret Hacker InPh0" is never really discussed except in private
- circles, so the only way anyone is going to get any is to meet new people
- and take the initiative to start interesting conversations.
-
- Because of this, the formal speaking portion of Summercon will be
- held on one day, not two or three, leaving plenty of time for people
- to explore the city, compare hacking techniques, or go trashing and
- clubbing with their heretofore unseen online companions.
-
- The "Conference" will be held on June 3rd from roughly 11:00 am until
- 6:00 pm with a 1 hour lunch break from 1:00 to 2:00.
-
- NO VIDEO TAPING WILL BE ALLOWED IN THE CONFERENCE ROOM. Audio Taping
- and still photography will be permitted.
-
-
- CURRENT LIST OF SPEAKERS:
-
- Robert Steele - Ex-Intelligence Agent, Founder and CEO of Open Source
- Solutions (a private sector intelligence firm)
-
- Topic: Hackers from the Intelligence Perspective
-
- Winn Schwartau - Author of "Information Warfare" and "Terminal Compromise",
- Publisher of Security Insider Report, and noted security
- expert
-
- Topic: Electromagnetic Weaponry
-
- Bob Stratton - Information Security Expert from one of America's largest
- Internet service providers
-
- Topic: The Future of TCP/IP Security
-
- Eric Hughes - Cryptography Expert and founding member of the "Cypherpunks"
-
- Topic: Cryptography, Banking, and Commerce
-
- Annaliza Savage - London-based Director/Producer
-
- Topic: Discussion of her documentary "Unauthorized Access"
- (Followed by a public screening of the film)
-
- Chris Goggans - Editor of Phrack Magazine and Summercon M.C.
-
- Topic: introductions, incidentals and a topic which is sure
- to culminate in an international incident.
-
-
- (Other Speakers May Be Added - Interested parties may contact scon@fc.net)
-
- COSTS
-
- Since other cons of this type have been charging from 25 to 40 dollars
- entry fees, we are only charging 10 dollars. Yes, that's correct,
- TEN (10) dollars in US currency. Money is far too scarce among the
- hacker community to fleece everyone for money they will probably need
- to eat with or pay for their hotel rooms.
-
-
- WHAT TO DO IN ATLANTA:
-
- To attempt to make everyone's stay in Atlanta more exciting, we are
- contacting local establishments to arrange for special discounts and/or
- price reductions for Summercon attendees. Information will be handed
- out regarding these arrangements at the conference.
-
- Atlanta is a happening town.
-
- Touristy Stuff Party Time
-
- The World of Coca-Cola Buckhead
- Underground Atlanta The Gold Club
- Georgia Dome (Baseball?) (Countless Other Clubs and Bars)
- Six Flags
-
- CONTACTING SUMMERCON SPONSORS
-
- You can contact the Summercon sponsors by several means:
-
- E-mail: scon@fc.net
-
- WWW: http://www.fc.net/scon.html
-
- Snail Mail: Phrack Magazine
- 603 W. 13th #1A-278
- Austin, TX 78701
-
-
- If deemed severely urgent, you can PGP your email with the following PGP
- key:
-
- - -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.6
-
- mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP
- Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk
- Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR
- tBRwaHJhY2tAd2VsbC5zZi5jYS51cw==
- =evjv
- - -----END PGP PUBLIC KEY BLOCK-----
-
-
- See you in Atlanta!
-
-
-
-
- -----BEGIN PGP SIGNATURE-----
- Version: 2.6
-
- iQCVAwUBL4mMEaR4oxgb1CldAQE5dQP+ItUraBw4D/3p6UxjY/V8CO807qXXH6U4
- 46ITHnRJXWfEDRAp1jwl+lyavoo+d5AJPSVeeFt10yzVDEOb258oEZkIkciBnr7q
- mUu563/Qq67gBsOWYP7sLdu3KEgedcggkzxtUzPxoVRVZYkHWKKjkG1t7LiT3gQ5
- uRix2FrftCY=
- =m/Yt
- -----END PGP SIGNATURE-----
-
- ------------------------------------------------------------------------------
-
- UNAUTHORIZED ACCESS
-
- "Unauthorized Access [is] a documentary that tells the story of the
- computer underground from our side, it captures the hacker world
- from Hamburg to Los Angeles and virtually everywhere in between."
- 2600 The Hacker Quarterly
-
- Computers are becoming an integral part of our everyday existence.
- They are used to store and send a multitude of information, from
- credit reports and bank withdrawals, to personal letters and highly
- sensitive military documents. So how secure are our computer
- systems?
-
- The computer hacker is an expert at infiltrating secured systems,
- such as those at AT&T, TRW, NASA or the DMV. Most computer systems
- that have a telephone connection have been under siege at one time
- or another, many without their owner's knowledge. The really good
- hackers can reroute the telephone systems, obtain highly sensitive
- corporate and government documents, download individual's credit
- reports, make free phone calls globally, read private electronic
- mail and corporate bulletins and get away without ever leaving a
- trace.
-
- So who are these hackers? Just exactly WHAT do they do and WHY do
- they do it? Are they really a threat? What do they DO with the
- information that they obtain? What are the consequences of their
- actions? Are hackers simply playing an intellectual game of chess
- or are hackers using technology to fight back and take control of
- a bureaucratic system that has previously appeared indestructible?
-
- Unauthorized Access is a documentary that demistifies the hype and
- propaganda surrounding the computer hacker. Shot in 15 cities
- and 4 countries, the film hopes to expose the truths of this subculture
- focusing on the hackers themselves.
-
- Unauthorized Access is a view from inside the global underground.
-
- For a PAL (European) copy send a cheque/postal order for 15 British
- Pounds or $25 for NTSC (American) standard to:
-
- Savage Productions
- Suite One
- 281 City Road
- London EC1V 1LA
-
- ------------------------------------------------------------------------------
-
- ACCESS ALL AREAS
- Hacking Conference
-
- 1st - 2nd July, 1995
- (Saturday & Sunday)
- King's College, London, UK
-
-
- -------------------------------WHAT-IT-IS---------------------------------
-
- The first UK hacking conference, Access All Areas, is to be run in London
- later this year. It is aimed at hackers, phone phreaks, computer security
- professionals, cyberpunks, law enforcement officials, net surfers,
- programmers, and the computer underground.
-
- It will be a chance for all sides of the computer world to get together,
- discuss major issues, learn new tricks, educate others and meet "The
- Enemy".
-
-
-
- -------------------------------WHERE-IT-IS--------------------------------
-
- Access All Areas is to be held during the first weekend of July, 1995 at
- King's College, London. King's College is located in central London on
- The Strand and is one of the premier universities in England.
-
-
-
- -----------------------------WHAT-WILL-HAPPEN-----------------------------
-
- There will be a large lecture theatre that will be used for talks by
- computer security professionals, legal experts and hackers alike. The
- topics under discussion will include hacking, phreaking, big brother and
- the secret services, biometrics, cellular telephones, pagers, magstrips,
- smart card technology, social engineering, Unix security risks, viruses,
- legal aspects and much, much more.
-
- Technical workshops will be running throughout the conference on several
- topics listed above.
-
- A video room, equipped with multiple large screen televisions, will be
- showing various films, documentaries and other hacker related footage.
-
- The conference facilities will also include a 10Mbps Internet link
- connected to a local area network with various computers hanging off of it
- and with extra ports to connect your laptop to.
-
-
-
- ------------------------------REGISTRATION--------------------------------
-
- Registration will take place on the morning of Saturday 1st July from
- 9:00am until 12:00 noon, when the conference will commence. Lectures and
- workshops will run until late Saturday night and will continue on Sunday
- 2nd July from 9:00am until 6:00pm.
-
-
-
- ----------------------------------COST------------------------------------
-
- The price of admission will be 25.00 British pounds (approximately US $40.00)
- at the door and will include a door pass and conference programme.
-
-
-
- -----------------------------ACCOMMODATION--------------------------------
-
- Accommodation in university halls of residence is being offered for the
- duration of the conference. All prices quoted are per person, per night
- and include full English breakfast. (In British pounds)
-
-
- SINGLE TWIN
- WELLINGTON HALL 22.00 16.75
-
-
- Special prices for British and Overseas university students, holding
- current student identification, are also available - please call King's
- Campus Vacation Bureau for details.
-
- All bookings must be made directly with the university. They accept
- payment by cash, cheque and credit card.
-
- To making a booking call the following numbers...
-
-
- KING'S CAMPUS VACATION BUREAU
-
- Telephone : +44 (0)171 351 6011
- Fax : +44 (0)171 352 7376
-
-
-
- ----------------------------MORE-INFORMATION------------------------------
-
- If you would like more information about Access All Areas, including
- pre-registration details then please contact one of the following...
-
-
- Telephone : +44 (0)973 500202
- Fax : +44 (0)181 224 0547
- Email : info@phate.demon.co.uk
-
-
-
- ------------------------------------------------------------------------------
-
- D I S T R I B U T E W I D E L Y
-
- *****FIRST CALL FOR PAPERS*****
-
- InfoWarCon '95
-
- A 2 Day International Symposium
- on Information Warfare
-
- September 7-8, 1995
- Stouffer Concourse Hotel
- Arlington, VA
-
- Presented by:
- National Computer Security Association
- Winn Schwartau and Interpact, Inc.
- Robert Steele and OSS, Inc.
-
-
- CONFERENCE OVERVIEW:
-
- The Information Warfare Conference (InfoWarCon) is our third
- international conference dedicated to the exchange of ideas,
- policies, tactics, weapons, methodologies and defensive posture
- of Information Warfare on a local, national, and global basis.
-
- InfoWarCon will bring together international experts from a broad
- range of disciplines to discuss and integrate concepts in this
- rapidly evolving field. Attendees will intensely interact with
- the speakers and presenters as well as each other to increase
- each other's understanding of the interrelatedness of the topics.
-
- While there are many interpretations of Information Warfare by
- different groups, the current working definition we employ is:
-
- Information Warfare is the use of information and informa
- tion systems as weapons in a conflict where information and
- information systems are the targets.
-
- Information Warfare is broken down into three categories, and
- InfoWarCon speakers and attendees will interactively examine them
- all:
-
- Class I: Personal Privacy. "In Cyberspace You Are Guilty
- Until Proven Innocent." The mass psychology of information.
- Privacy versus stability and law enforcement.
-
- Class II: Industrial and Economic Espionage. Domestic and
- international ramifications and postures in a globally
- networked, competitive society.
-
- Class III: Global Information Warfare. Nation-state versus
- Nation-state as an alternative to convention warfare, the
- military perspective and terrorism.
-
- THE CONFERENCE
-
- The conference is designed to be interactive - with extensive
- interaction between all participants. The preliminary contents
- and discussions will focus on:
-
- - What is Information Warfare?
- - What Are the Targets?
- - Protecting the Global Financial Infrastructure
- - Military Perspectives on InfoWar
- - InfoWar Vs. Non-Lethal Warfare
- - Defending the U.S. Infrastructure
- - The Intelligence Community and Information
- - Open Source Intelligence
- - The Psychology of Information
- - Privacy Balances
- - Information As the Competitive Edge
- - International Cooperation
- - Denial of Service
- - Cyber-Terrorism
- - Offensive Terrorism
- - Offensive InfoWar Techniques
- - Defensive InfoWar Postures
- - Education and Awareness Training
- - Corporate Policy
- - Government Policy
- - Global Policy
- - Espionage
- - Export Controls of Information Flow
- - The Legal Perspective
- - The New Information Warriors
-
- Plenary sessions will accommodate all attendees, while break-out
- sessions will provide more intimate presentations and interactiv
- ity on topics of specific interests.
-
- SUBMISSIONS:
-
- Submission for papers are now be accepted. We are looking for
- excellent speakers and presenters with new and novel concepts of
- Information Warfare. You may submit papers on the topics listed
- above, or on others of interest to you, your company or govern
- ment.
-
- We welcome innovative thought from the private sector, the gov
- ernment (civilian, military and intelligence) and the interna
- tional community. Submissions must be received by May 1, 1995,
- and notification of acceptance will occur by June 1, 1995.
- Please submit 2-3 page presentation outlines to:
-
- winn@infowar.com.
-
- All submissions and the contents of InfoWarCon '95 will be in
- English. If you must submit a hard copy: Fax: 813.393.6361 or
- snail mail to: Interpact, Inc. 11511 Pine St., Seminole, FL
- 34642
-
- All submissions and presentation should be unclassified, as they
- will become Open Source upon submission and/or acceptance.
-
- SPONSORS:
-
- The Information Warfare Symposium is currently choosing sponsors
- for various functions.
-
- Continental Breakfast, Day 1 and Day 2
- Morning Coffee Break, Day 1 and Day 2
- Lunch, Day 1 and Day 2
- Afternoon Coffee Break, Day 1 and Day 2
- Cocktail Party, Day 1
-
- Each Corporate or Organizational sponsor will be included in all
- promotional materials and Symposium function. For more infor-
- mation, contact Paul Gates at the NCSA. Voice: 717.258.1816 or
- email: 747774.1326@Compuserve.com.
-
- EXHIBITS:
-
- Limited space is available for table-top displays for commercial
- or governmental products, services, educational or other promo
- tion. For further information, contact Paul Gates at the National
- Computer Security Association. 717.258.1816
-
- REGISTRATION:
-
- Payment made BEFORE July 1, 1995:
-
- ( ) $445.00 NCSA Member/OSS Attendee
- ( ) $545.00 All others
-
- Payment made AFTER July 1, 1995:
-
- ( ) $495.00 NCSA Members/OSS Attendees
- ( ) $595.00 All others
-
- ( ) I'M INTERESTED, but would like more information sent to the
- address above. Please include a free copy of your 32 page
- "Information Security Resource Catalog".
-
- ( ) I'd like to know more about NCSA on-site training, security
- audits and consulting services. Please have someone give me
- a call.
-
- MAIL OR FAX TO:
-
- National Computer Security Association
- 10 South Courthouse Avenue
- Carlisle, PA 17013
- Phone 717-258-1816 or FAX 717-243-8642
- EMAIL: 74774.1326@compuserve.com
- CompuServe: GO NCSAFORUM
-
- Winn Schwartau Interpact, Inc.
- Information Security & Warfare
- V:813.393.6600 F:813.393.6361
- Email: Winn@Infowar.Com
-
- ------------------------------------------------------------------------------
-
- Ed Cummings, also known to many in cyberspace as "Bernie S" was arrested
- on March 13th, 1995 for 2 misdemeanors of possession, manufacture and sale
- of a device to commit Telecommunications fraud charges. He is being held in
- Delaware County Prison in lieu of $100,000.00 Bail. His story follows.
-
- On the evening of the 13th Bernie S. received a page from his mail drop.
- Some people he knew from Florida had stopped in at his mail drop thinking
- it was his address. They were looking to purchase several 6.5 Mhz Crystals.
- These crystals when used to replace the standard crystal in the RADIO SHACK
- Hand Telephone dialer, and with some programming, produce tones that trick
- pay phones into believing they have received coins. These are commonly
- referred to as "red boxes" and got their name from an actual red box pulled
- from a pay phone in the late seventies by some curious person.
-
- Ed Cummings met these people at a local 7-11 (which 7-11?) where he was
- to sell the widely used electronic timing crystals for roughly $4 a piece.
- The purchaser only had two twenty dollar bills and Ed Cummings no change.
- Ed Cummings went into the 7-11 to get some change to make the transaction.
- A police officer noticed a van parked in the parking lot of the 7-11 with
- more several African Americans inside. As Ed was leaving the 7-11 he noticed
- fifteen police cars pulling into the parking lot of the 7-11.
-
- Next thing he knew the police were asking him if they could `rifle`
- through his car. He said no. Moments later as he was talking to a Detective
- and noticed another police officer going through his car. He asked the officer
- to stop. They did not, in all the police confiscated a few hundred 6.5Mhz
- crystals (which he resells for roughly $4 a piece) and a large box of 100
- dialers. The police told him they would get back to him, and he could have
- his electronics back if the contents of the bag were legal. In the contents
- of the seized items was one modified dialer, that a customer returned after
- modification explaining that it did not work, a broken red box.
-
- The next day Ed `Bernie S.` Cummings was over at a friend`s house working
- on their computer when eight to ten plain clothed armed men burst into the
- house and ordered him and his friends to freeze. They cuffed him and took him
- to a holding cell (what jail?). There he was left without a blanket or jacket
- to sleep with in the cold cell.
-
- That evening the Secret Service had been called in when someone figured
- out what the dialers and crystals would do when put together. The
- United States Secret Service found his home and entered it, while they were
- questioning him.
-
- The next morning at his arraignment he was finally told of the charges
- he was being held upon. They were Two misdemeanor Charges of manufacture,
- Distribution and Sale of devices of Telecommunications Fraud. and Two Unlawful
- use of a computer charges. His bail was automatically set to $100,000.00
- because Ed Cummings refused talk with the police without his attorney present.
-
- The Secret Service presented to the judge a 9 page inventory of what
- they had found in his home. On that inventory there 14 computers. 2 printers.
- more Boxes of bios chips for the systems he worked with. Eprom burners which
- the Federal Agents had labeled "Cellular telephone chip reprogramming adapters"
- Eproms are used in everything from Automobile computers to personal computers.
- They also confiscated his toolbox of screw drivers, wire clippers and other
- computer oriented tools he used for his consulting job.
-
- The Judge dropped the Two unlawful use of a computer charges due to
- the fact that the evidence was circumstantial and the county had no actual
- evidence that Ed had ever used the computers in question.
-
- As of 3/27/1995 Ed Cummings is still in Delaware County Prison
- awaiting his trial. His trial has not yet been scheduled and Ed will most
- likely not raise the One Hundred Thousand Dollars needed to be released on
- bail.
-
- ------------------------------------------------------------------------------
-
- "Don't believe the hype." - Public Enemy, 1988
-
- This file's purpose is to clear up any misconceptions about the recent
- situation that has come upon the sociopolitical group known as KoV.
-
- As it stands now, (10:55 PM EST on 1/29/95), NO ONE has been busted for
- ANYTHING. We have received several tip-offs from private sources regarding
- a supposed "FBI investigation" of our group that is purported to be active
- at this very minute. However, with the exception of a few VERY suspicious
- incidents and coincidences, there has been NO HARD EVIDENCE thus far about
- ANYONE getting busted for ANYTHING. So while we are EXTREMELY concerned for
- the integrity of our innocence, we must stress that nothing has gone down.
-
- Yet.
-
- We have very good reason to believe that a few of those among us are about
- to be charged with various false accusations by a local university. However
- the current mental state of the person in charge of this charade is also in
- question. Therefore it would be logical to assume nothing. The conflicting
- tip-offs, rumors, warnings and threats that we have received make it even
- more difficult to get a clear picture of exactly what is going on. We have
- heard so many things from so many different sources, both credible and
- questionable, that we would be hard-pressed to give an accurate evaluation
- of the current state of things.
-
- What we can say for sure, however, is that KoV officially died on Monday,
- January 23, 1995, along with its communications network, KoVNet. This
- promises to be a great loss to the open-minded and sociopolitical community
- as well as the free-thinkers and activists who supported us so generously.
- Our reasons for disbanding the group were many, but the foremost was in
- light of the current situation we are facing.
-
- Consider this last obstacle our final, stalwart stand against the evils of
- AmeriKKKan government and its various greedy, capitalistic agencies.
- From the moment of KoV's conception, they have publicly sought to destroy
- us; to silence our questioning of authority, to oppress our free-thinking
- minds, and to close off our intellectual channels of communication. They
- have even gone so far as to stalk us in public places. 'Tis a shame indeed.
-
- If you have any questions or if you wish to contact us for any reason,
- you may email sgolem@pcnet.com with the subject or header of "ATTN: KoV".
- I will try to post further updates of this saga to CiPNet, ThrashNet,
- QuantumNet, InsanityNet, ScumNet, FizzNet, NukeNet and any others I can.
- We would appreciate any support that other h/p, art or political groups can
- lend us. Until then, my friends...
-
- -Lord Valgamon, Malicious Intent, Onslaught, Leland Gaunt & the rest of KoV
-
- ------------------------------------------------------------------------------
-
- What happens when you are caught beige boxing.
-
- by Rush 2
-
-
- Yeah yeah, I'm the only one. But here is a generally interesting
- description of everything to getting caught to arraignment.
-
- Well about 5 months ago i needed to set up a conference really quick..
- it was about 12:00 (never knew there was a 10:00 pm curfew in that area)
- and went to a 25 pair box at this local strip mall. Well I was out there
- the box was already open and I was just about to start testing pairs to
- see which was connected and what wasn't.
-
- All of a sudden, i hear this loud screeching sound of a car coming
- to a skid from doing about 90mph. I turned and saw that typically dirty
- squad car about to hit me.. you know the car, mud and dust on the tires
- and body, coffee and smudge marks all over the windshield. i got on my
- bike and started to run. Now the thing is I COULD have gotten away.. the
- pathetic excuse for a cop had run not more than 10 yards after me and
- decided that I was a threat so he pulled his handgun and yelled. I saw
- this and thought it would be wiser to stop than get shot.
-
- Within 2 minutes at LEAST 10 squad cars had come to his aide.. i did
- not know i was less than a half mile from a police station and they were
- looking for a prowler in the general area. The police did the normal,
- called me scum, asked me what i was doing, searched me until they were
- satisfied... than picked me up and threw me in the car... the funny
- thing was they didn't see my phone until they threw me into the back seat
- and the cord fell out.. (they never saw the page of notes and 'naughty'
- material in my pocket though it was about 4 inches thick and sticking out
- that a blind man could see it.
-
- Well they got me to the station and pried my info out, and called my
- father... I came up with a good enough story about some made up user
- who told me to go across the street and plug in.. then I was told I
- would be dealt with in the next week... I did not receive anything for
- three and a half months.
-
- Once the time came for the arraignment (for a juvenile they called it
- an intake). I got to go to the police station, sit for about 3 hours (as
- if i thought they would be on time) until I waited for my probation
- officer. Finally she got there and we proceeded to talk. She explained
- all of the charges and my lawyer (interesting guy) laughed, I was being
- charged with prowling (could be disputed I was on a public sidewalk and
- there in that strip mall is a 24 hr laundry mat), loitering (again that
- could be disputed), and attempted theft of services (though I NEVER even
- plugged in).
-
- After this was all said i spent the next hour talking with the lady
- in private. I immediately found she had an interest in computers and was
- having a problem with her home pc. So I easily changed the topic to my
- fascination in computers and solved her problem with her computer, and
- answered at least 50 questions about them. In the last 10-15 minutes of
- the conversation all i could get from her were statements about how
- impressed and how intrigued she was with me. She ended up giving me a
- look (that was hard to judge but i am staying away from this chick) that
- was either confusion or attraction, slipped me a card with her home phone
- number and name and called back in my lawyer and parents.
-
- Once they got back in, all that she really said was I was a great boy,
- that she would like to see me do more with my time besides computers, and
- that she was taking my sentence of 12 months formal probation with 300
- hours of community service to 3 months of informal probation with 30
- hours of community service. That and she said bell was asking her what
- to do and she would tell them that it was a non issue since I did not
- plug in and even if I had it would not be their concern unless I had
- plugged in to the telco access part of the network interface.
-
- Well I have yet to receive official record of having to perform
- the community service or the probation but I called my probation officer
- yesterday and said she wasn't putting the community service into the
- punishment and it has been an equivalent amount of time to just say that
- since I haven't gotten in trouble since she will count the probation as
- already served. Luckily she based all other needs of me on the report
- from a teacher, and with my luck she picked the one teacher, my computers
- teacher, that no matter what I did or said would lie and say I didn't.
-
-
- Thanks to erikb for publishing this, and greets to CXrank, paradox,
- dark phiber, the fat cop (who spilled his coffee and box of donuts
- coming after me) that made this all possible, and to everyone else.
-
-
- -rush 2
- http://www-bprc.mps.ohio-state.edu/cgi-bin/hpp/Rush_2.html
-
-
- Look for My site, unforeseen danger soon to be on a 28.8 slip
- and by the end of the summer on a 500k slip connect.
-
-
- ------------------------------------------------------------------------------
-
- [Something found on IRC]
-
- Danny Partridge Emmanuel Goldstein
- (AKA Danny Bonaduce: (AKA Eric Corley:
- a child star from the child-like publisher
- "The Partridge Family" of 26oo magazine.
- ---------------------- ------------------
-
- Hosts a boring local Hosts a boring local
- radio program. radio program.
-
- Quasi Celebrity Quasi Celebrity
- Status among Status among
- 70's freaks telephone phreaks
-
- Periods of Heavy Periods of Heavy
- Drug Usage Drug Usage
-
- Involved in Sex Involved in Sex
- Scandal with Scandal with
- another man another man
-
- Last name is Friends with Phiber
- "Bonaduce" Optik whose first
- handle was "Il Duce"
-
- Supplements incoming Supplements incoming
- by doing desperate by doing desperate
- local talk shows local talk shows
- whenever he can. whenever he can.
-
- ------------------------------------------------------------------------------
-
- Top 10 #hack fights that would be the coolest to see.
- (And no, Ophie's not in it twice just because she's a girl...)
- ===========================================================================
-
- 10.) The D.C. Convention Center is Proud to Present: Hot-Oil Wrestling
- featuring KL & TK.
-
- 9.) Ludichrist vs. GFM, to be resolved at the next convention, or, uh, the
- one after that... or, uh...
-
- 8.) C-Curve and Elite Entity, "Who's who?"
-
- 7.) Ben Camp vs. Ben Sherman, "Particles of Novocain Everywhere."
- (Or: "I'm totally numb, let me hug you!!!")
-
- 6.) Dan Farmer and Pete Shipley: "Whips vs. Chains"
-
- 5.) Grayarea vs. Netcom "No, *I* want root..."
-
- 4.) WWF Wrestling with Len and |al|.
-
- 3.) Ophie vs. Voyager, "Night of the Living Dead."
-
- 2.) Okinawa vs. Gail Thackery, "The Winner Gets Okinawa's Testicle."
- and the number one #hack fight is
-
- 1.) Ophie vs. all the #hack guys, "10 Bucks on the Girl"
-
-
- ------------------------------------------------------------------------------
-
- P A S S W O R D E N G I N E (for IBM PC's) by Uncle Armpit
- +++++++++++++++++++++++++++++++++++++++++++++
-
- The device driver code listed below provides a data stream of passwords.
- The device driver approach was used to speed up the process
- of cracking passwords on an incremental basis. The usual approach was
- to generate the passwords to a file, then reading the file, etc..the device
- driver approach circumvents these file storage problems, and others, such as
- having enough free disk space and delays from disk i/o.
- This driver operates completely in memory (approx. 0.5Kb)
-
- How practical is this?
- ----------------------
- This program would be very useful if you think you may know what strategy
- the user/admin uses for picking out their passwords. Without eliciting some
- sort of a strategy, forget it-- unless your desperate enough!!
-
-
- A "strategy" could consist of any of these possible advantages--
-
- 1) default passwords (ie: SIN, student #, birth date, phone number...)
- 2) the mutation of a lUSERs' known password from another system
- 3) viewing the mark typing in most of their password with a couple
- of unseen characters
- 4) etc...
-
- ---------------------------
- With the sample device driver provided, passwords starting at
- 'aaaaaaa' and ending with 'zzzzzzz' will be generated. The length
- of the password string can be modified by changing the length of
- the password string itself (that is, the variable "number"). The
- range of characters in the passwords can also be changed by
- modifying the following two lines:
-
- ;hackdrv.sys
- ;.
- ;.
- ;
- for ending character--
- cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range
-
- ...and for starting character
- cmp byte ptr [number+si],'a' ;starting char. in range
- ;
- ;----------------------
-
- for instance, if you wished to generate numbers from "0000000" to
- "9999999"
-
- -change the ending character to:
- cmp byte ptr [number+si],'9'+1
-
- -starting character to:
- cmp byte ptr [number+si],'0'
-
- and "number" variable from 'aaaaaa' to '0000000' and then
- recompile..
-
- -----
-
- ..or in the third case, if u had observed a lUSER type in most of
- their password, you may want to rewrite the code to limit the
- search. IE: limit the keys to a certain quadrant of the keyboard.
- Modify the code starting at "reiterate:" and ending at "inc_num
- endp" for this.
- =================================================================
-
-
- /'nuff of this!/ How do I get things working?
- -----------------------------------------------
-
- Compile the device driver "hackdrv.sys", and the second program,
- "modpwd.asm". Then specify the device driver inside config.sys
- (ie: "c:\hackdrv.sys"). The code below was compiled with the a86
- compiler, v3.03. Some modifications might be needed to work with
- other compilers.
-
- To use it in prgs like crackerjack, type in the following on the
- command line:
-
-
- c:\>jack -pwfile:<your password file here!> -word:hackpwd
-
- ------
- If you had stopped a cracker program (eg: crackerjack) and want to
- pick up from where you left off, run the program "modpwd.com".
-
- This program can change HACKDRVs password through-
-
- a) a command line argument (ie: "modpwd aabbbbe")
- b) executing the program with no parameters (this method also
- displays the current password in memory)
-
-
-
- Happy Hacking,
- Uncle Armpit
-
- ;-----------------------cut here--------------------------------
- ;Program HACKDRV.SYS
- ;
- org 0h
- next_dev dd -1
- attribute dw 0c000h ;character device w/ ioctl calls
- strategy dw dev_strategy
- interrupt dw dev_int
- dev_name db 'HACKPWD '
- countr dw offset number
- number db 'aaaaaa',0ah ;<----six characters, lower case
- numsize equ $-number - 2
- afternum:
-
- ;working space for device driver
- rh_ofs dw ?
- rh_seg dw ?
-
- dev_strategy: ;strategy routine
- mov cs:rh_seg,es
- mov cs:rh_ofs,bx
- retf
-
- dev_int: ;interrupt routine
- pushf
- push ds
- push es
- push ax
- push bx
- push cx
- push dx
- push di
- push si
-
- cld
- push cs
- pop ds
-
- mov bx,cs:rh_seg
- mov es,bx
- mov bx,cs:rh_ofs
-
- mov al,es:[bx]+2
- rol al,1
- mov di,offset cmdtab
- xor ah,ah
- add di,ax
- jmp word ptr[di]
-
-
- cmdtab: ;command table
- dw init ;0
- dw exit3 ;1
- dw exit3 ;2
- dw ioctl_read ;3
- dw do_read ;4
- dw exit3 ;5
- dw exit3 ;6
- dw exit3 ;7
- dw exit3 ;8
- dw exit3 ;9
- dw exit3 ;10
- dw exit3 ;11
- dw ioctl_write ;12
- dw exit3 ;13
- dw 5 dup (offset exit3)
-
-
-
- ioctl_read:
- push es
- push bx
-
- mov si,es:[bx+10h]
- mov di,es:[bx+0eh]
- mov es,si
-
- push cs
- pop ds
- mov si,offset number
- xor cx,cx
-
- get_char:
- lodsb
- stosb
- inc cl
- cmp al,0ah
- jz ioctl_rend
- jmp get_char
-
- ioctl_rend:
- pop bx
- pop es
- mov es:[bx+012h],cx
- mov cs:countr,offset number
- jmp exit2
-
- ioctl_write:
- push es
- push bx
- mov si,es:[bx+010h]
- mov ds,si
- mov si,es:[bx+0eh]
- mov cx,numsize+1 ;es:[bx+012h]
- push cs
- pop es
- mov di,offset number
- repe movsb
- pop es
- pop bx
- mov cs:countr,offset number
- jmp exit2
-
-
- do_read:
- push es
- push bx
-
-
- push cs
- pop ds
-
- mov si,[countr]
- inc si ;word ptr [countr]
- cmp si,offset afternum
- jnz is_okay
- mov si,offset number
- call inc_num
-
-
- is_okay:
- mov [countr],si
- mov di,es:[bx]+0eh
- mov ax,es:[bx]+010h
- mov cx, es:[bx]+012h
- jcxz clean_up
- mov es,ax
- repe movsb
-
- clean_up:
- pop bx
- pop es
- jmp exit2
-
-
- exit3: mov es:word ptr 3[bx],08103h
- jmp exit1
-
- exit2:
- mov es:word ptr 3[bx],0100h
-
- exit1:
- pop si
- pop di
- pop dx
- pop cx
- pop bx
- pop ax
- pop es
- pop ds
- popf
- retf
- exit:
-
- inc_num proc near
- push si
- mov si,numsize
-
- reiterate:
- inc byte ptr [number+si]
- cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range
- jnz _exit
- mov byte ptr [number+si],'a' ;starting char. in range
- dec si
- cmp si,-1
- jnz reiterate
- mov byte ptr [number],01ah ;send EOF
- _exit:
- pop si
- ret
- inc_num endp
-
-
-
- at_eof: ; the non-resident code starts here
-
- initial proc near
- push es
-
- push cs
- pop ds
-
- push cs
- pop es
-
- mov si,offset number
- mov di,offset tmpnum
- cld
- _again:
- lodsb
- cmp al,0ah
- jz _nomorechars
- stosb
- jmp _again
-
- _nomorechars:
- mov si,offset msgend
- mov cx,4
- repe movsb
-
- mov ah,09 ;print welcome message
- mov dx,offset msg1
- int 21h
-
- pop es
- ret
- initial endp
-
- init: call initial
- mov ax,offset at_eof
- mov es:[bx]+0eh,ax
- push cs
- pop ax
- mov es:[bx]+010h,ax
- mov cs:word ptr cmdtab,offset exit3
- jmp exit2
-
-
- msg1 db "Incremental Password Generator (c)1995",0ah,0dh
- db "Written by Uncle Armpit",0ah,0dh,0ah,0dh
- db "Starting at word ["
- tmpnum db 10 dup (?)
- msgend db "]",0a,0d,'$'
- ;END hackdrv.sys
-
- ;------------------------------cut here----------------------------------
-
- ;PROGRAM modpwd.asm
- ;
- org 0100h
- mov ax,03d02h
- xor cx,cx
- mov dx,offset devname
- int 21h
- jnc drvr_found
-
- mov ah,09
- mov dx,offset no_drvr
- int 21h
- jmp error_pass
-
-
- drvr_found:
- mov bx,ax
- mov ax,04402h
- mov cx,20 ;read 20 characters
- mov dx,offset databuffr
- int 21h
-
- mov pass_len,al
- dec al
- mov ah,al
- and al,0fh
- mov cl,4
- shr ah,cl
- add ax,03030h
- cmp al,'9'
- jbe inrange
- add al,7
- inrange:
- cmp ah,'9'
- jbe inrange1
- add ah,7
- inrange1:
- mov byte ptr [num_chr],ah
- mov byte ptr [num_chr+1],al
-
-
- cld
- mov di,offset databuffr-1
- xor cx,cx
- mov cl,pass_len
- add di,cx
- mov si,offset pass_end
- mov cx,stringsz
- repe movsb
-
- ;check for information in command line
- ;else--> prompt for user input
- mov al,pass_len
- or byte ptr [0080h],0
- jz req_input
- mov cl,[0080h]
- dec cl
- mov [0081h],cl
- mov si,0081h
- mov di,offset newpass
- mov cx,20
- repe movsb
- jmp vrfy_info
-
- req_input:
- mov ah,09
- mov dx,offset cur_pass
- int 21h
-
- mov ah,0a
- mov dx,offset pass_len
- int 21h
-
-
- vrfy_info:
- mov ax,word ptr [pass_len]
- cmp ah,0
- jz error_pass
- dec al
- cmp ah,al
- jnz error_len
-
- ;change the current password
- xor cx,cx
- mov cl,al
- mov ah,044h
- mov al,03
- mov dx,offset newpass+1
- int 21h
- jnc success_pass
-
- error_len:
- mov ah,09
- mov dx,offset errormsg
- int 21h
-
- error_pass:
- mov ax,04c01h ;abnormal termination
- int 21h
-
- success_pass:
- mov ax,04c00h
- int 21h
-
-
- devhandle dw ?
- cur_pass db 'Current password is ['
- databuffr db 20 dup (?)
- pass_end db '] ;'
- num_chr db ' '
- db ' characters',0ah,0dh,0ah,0dh
- prompt db 'New word: ','$'
- stringsz equ $ - pass_end
-
- pass_len db 00
- newpass db 20 dup (?)
- errormsg db 'error changing password!',0ah,0dh,'$'
- no_drvr db 'Error: '
- devname db "HACKPWD ",00
- db 'device driver not loaded!',0ah,0dh,07,'$'
-
-
- ------------------------------------------------------------------------------
-
- -- Frequently & Rarely asked questions about VMS -- part one
- by Opticon the Disassembled - UPi
-
- [1]
-
- " I have a kropotkin.hlp file. What could I possibly do with it ? "
-
- $ library /insert /help sys$help:helplib.hlb kropotkin.hlp
- .
- .
- .
- $ help kropotkin
-
- [2]
-
- " I have a bakunin.tlb file. What to do with it ? "
-
- $ library /extract=(*) bakunin.tlb
- .
- .
- .
- $ dir
-
- [3]
-
- " I would like to have a look at prunton.dat. "
-
- $ dump [/block=(count:x)] prunton.dat
-
- Where "x" is the number of blocks DUMP will display.
-
- [4]
-
- " How can I use an external editor with mail ? "
-
- $ mail :== mail /edit=(send,reply=extract,forward)
-
- [5]
-
- " How a HELP file is organized ? "
-
- $ create example.hlp
- 1 EXAMPLE
-
- THIS IS AN EXAMPLE.
-
- 2 MORE_EXAMPLES
-
- MORE EXAMPLES.
-
- 3 EVEN_MORE_EXAMPLES
-
- EVEN MORE EXAMPLES.
- <CTRL-Z>
-
- [6]
-
- " How can I have a look at queues ? "
-
- $ show queue smtp /all/full
-
- or
-
- $ show queue /batch/all/full
-
- or
-
- $ show queue /all/full
-
- [7]
-
- " My mail is holded, for some reason, in the SMTP queue... "
-
- Either
-
- $ delete /entry=XXX
-
- or
-
- $ set entry XXX /release
-
- in order to force VMS to release it right away.
-
- [8]
-
- " How do I have a look at DTE and circuits available. "
-
- $ mc ncp show known dte
-
- and
-
- $ mc ncp show known circuits
-
- You may also may find of interest:
-
- $ mc ncp show known networks
-
- $ mc ncp show known lines
-
- $ mc ncp show known destinations
-
- [9]
-
- " I need a NUA scanner for VMS. "
-
- $ OPEN/READ VALUES SCAN.VAL
- $ READ VALUES PRE
- $ READ VALUES DTE
- $ READ VALUES END
- $ CLOSE VALUES
- $ LOG = "SCAN.LIS"
- $ TMP = "SCAN.TMP"
- $ OPEN/WRITE FILE 'LOG
- $ WRITE FILE "PREFIX:",PRE
- $ WRITE FILE "START :",DTE
- $ WRITE FILE "LAST :",END
- $LOOP:
- $ ON ERROR THEN GOTO OPEN
- $ SPAWN/NOWAIT/OUTPUT='TMP' SET HOST/X29 'PRE''DTE'
- $ WAIT 00:00:06
- $ SPAWN_NAME = F$GETJPI("","USERNAME")
- $ SPAWN_NAME = F$EXTRACT(0,F$LOC(" ",SPAWN_NAME),SPAWN_NAME) + "_"
- $ CONTEXT = ""
- $FIND_PROC:
- $ PID = F$PID(CONTEXT)
- $ IF PID .EQS. "" THEN GOTO OPEN
- $ IF F$LOC(SPAWN_NAME,F$GETJPI(PID,"PRCNAM")) .EQ. 0 THEN STOP/ID='PID
- $ GOTO FIND_PROC
- $OPEN:
- $ ON ERROR THEN GOTO OPEN
- $ OPEN/READ PAD 'TMP
- $ MSSG = " Process stopped"
- $ ON ERROR THEN GOTO CLOSE
- $ READ PAD LINE
- $ IF F$LOC("call clear",LINE) .LT. F$LEN(LINE) THEN READ PAD LINE
- $ MSSG = F$EXTRACT(F$LOC(",",LINE)+1,80,LINE)
- $CLOSE:
- $ CLOSE PAD
- $ DELETE 'TMP';*
- $ IF F$LOC("obtain",MSSG).NE.F$LENGTH(MSSG) THEN GOTO NOCONN
- $ WRITE FILE PRE,DTE,MSSG
- $NOCONN:
- $ DTE = DTE + 1
- $ IF DTE .LE. END THEN GOTO LOOP
- $ CLOSE FILE
-
- ( I don't have a clue by whom the code was written. )
-
- then
-
- $ create scan.val
- prefix
- starting_NUA
- ending_NUA
- <CTRL-Z>
- $ submit /noprint scan.com
- .
- .
- .
- $ search scan.lis "call connected"
-
- [10]
-
- " How do I crash a VAX !? "
-
- $ set default sys$system
- $ @shutdown
-
- or
-
- $ set default sys$system
- $ run opccrash
-
- [11]
-
- " I have a dostogiefski.cld file; what do I do with it ? "
-
- $ set command dostogiefski.cld
-
- [12]
-
- " Can I send messages to interactive processes ? "
-
- $ reply [/user=username] [/bell] [/id=xxxx] " Carlos Marigella "
-
- [13]
-
- " How can I prevent someone from phoning me all the time ? "
-
- $ set broadcast=(nophone)
-
- [14]
-
- " Can I postpone/disable interactive logins ? "
-
- $ set logins /interactive=0
-
- $ set logins /interactive
-
- will display current value.
-
- Under the same `logic' :
-
- $ create innocent_filename.com
- $ set nocontrol
- $ context = ""
- $ pid = F$PID(context)
- $ user_name = F$GETJPI(pid,"username")
- $ wait 00:01:00.00
- $ write sys$output ""
- $ write sys$output " System overloaded; please try again later "
- $ write sys$output " Logging out process ''pid', of user ''user_name' "
- $ write sys$output ""
- $ logout /full
-
- Add either to sys$system:sylogin.com or sys$login:login.com the following:
- " $ @innocent_filename.com ".
-
- [15]
-
- " How can I modify the welcome file ? Where is it held ? "
-
- $ set default sys$system
- $ edit welcome.txt
-
- [16]
-
- " I am editing a huge text file. How can I reach the end of it ? "
-
- at the editor's prompt type:
-
- *find end
-
- or
-
- *find "search string"
-
- [17]
-
- " How can I be sure than noone is watching me from a hidden process ? "
-
- $ show system /process
- VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:41.94 Uptime 2 03:05:25
- Pid Process Name State Pri I/O CPU Page flts Ph.Mem
- .
- .
- .
- 00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47
- 00000117 SMTP_SYMBIONT HIB 4 33398 0 00:16:49.67 246104 426
- 00000118 SYMBIONT_6 HIB 4 47868 0 00:05:09.01 296 121
- 00001255 SYMBIONT_0001 CUR 13 15 64293 0 00:05:08.12 1982 248
-
- $ show system /full
-
- VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:59.64 Uptime 2 03:05:43
- Pid Process Name State Pri I/O CPU Page flts Ph.Mem
- .
- .
- .
- 00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47
- [1,4]
- 00000117 SMTP_SYMBIONT LEF 5 33407 0 00:16:49.78 246116 502
- [1,4]
- 00000118 SYMBIONT_6 HIB 5 47872 0 00:05:09.03 296 121
- [1,4]
- 00001255 SYMBIONT_0001 CUR 13 15 64348 0 00:05:09.60 2063 268
- [1,4]
- $
-
- See the difference between system's SYMBIONT processes ( i.e. SYMBIONT_4,
- SYMBIONT_6, SMTP_SYMBIONT ) and the one created by using a `stealth' program
- ( SYMBIONT_0001 ); the names and the User Identification Codes may vary, but
- state, priority, physical memory used, page faults, input/output and Process
- IDentification numbers, can reveal, in combination, such a nastyness.
-
- Afterwards you may " show process /id=xxxx /continuous ",
- or " stop /id=xxxx ".
-
- [18]
-
- " Can I view the CPU usage of each process ? "
-
- $ monitor processes /topcpu
-
- will display a bar-chart of this kind.
-
- [19]
-
- Run the following .COM file and it will display information you'd
- possibly need on an account and/or node. It uses simple lexical functions.
-
- $ output :== write sys$output
- $ output ""
- $ node_id = F$CSID(context)
- $ nodename = F$GETSYI("nodename",,node_id)
- $ if F$GETSYI("cluster_member") .EQS. "TRUE"
- $ then output " ''nodename' is a member of a cluster. "
- $ else output " ''nodename' is not a member of a cluster. "
- $ context = ""
- $ username = F$GETJPI("","username")
- $ output " Username : ''username' "
- $ group = F$GETJPI("","grp")
- $ output " Group : ''group' "
- $ uic = F$USER()
- $ output " User Identification Code : ''uic' "
- $ pid = F$PID(context)
- $ output " Process IDentification : ''pid' "
- $ process = F$PROCESS()
- $ output " Process Name : ''process' "
- $ terminal = F$GETJPI("","terminal")
- $ output " Terminal Name : ''terminal' "
- $ priority = F$GETJPI("","authpri")
- $ output " Authorized Priority : ''priority' "
- $ maxjobs = F$GETJPI("","maxjobs")
- $ output " Maximum Number of Processes Allowed : ''maxjobs' "
- $ authpriv = F$GETJPI("","authpriv")
- $ output " Authorized Privileges : ''authpriv' "
- $ curpriv = F$GETJPI("","curpriv")
- $ output " Current Privileges : ''curpriv' "
- $ directory = F$DIRECTORY()
- $ output " Directory : ''directory' "
- $ protection = F$ENVIRONMENT("protection")
- $ output " Protection : ''protection' "
- $ boottime = F$GETSYI("boottime")
- $ output " Boot Time : ''boottime' "
- $ time = F$TIME()
- $ output " Current Time : ''time' "
- $ version = F$GETSYI("version")
- $ output " VMS version : ''version' "
- $ output ""
-
- You may :
-
- $ library /extract=(lexicals) /output=lexicals.hlp sys$help:helplib.hlb
-
- and then transfer lexicals.hlp.
-
- [20]
-
- " How can I view/modify my disk quota limit ? "
-
- DiskQuota was a standalone utility in versions prior to five; It is now
- a subset of the System Management utility, and thus you should :
-
- $ set def sys$system
- $ run sysman
- SYSMAN> diskquota show /device=dua1: [1,1]
- %SYSMAN-I-QUOTA, disk quota statistics on device DUA1: --
- Node
- UIC Usage Permanent Quota Overdraft Limit
- [1,1] 123456 1500000 100
-
- SYSMAN> diskquota modify /device=dua1: [1,1] /permquota=654321 /overdraft=1000
-
- [END]
-
- Post Scriptum
-
- Some operations require privileges.
-
-
- ------------------------------------------------------------------------------
-
- Compaq CEO blunders on TV
-
- Compaq CEO Eckard Pfeiffer last week visited The Netherlands
- to do some pr work. During a television interview for NOVA,
- a well known news show that aired last Friday, Pfeiffer
- claimed that pc's were easy to use, and could be used by
- virtually anyone. So, the reporter asked him to switch the
- tv channel on a Presario that was next to Pfeiffer that ran
- a Windows-based TV tuner. The result was Pfeifer frantically
- clicking on several menu bars, but instead of switching
- channels, he exited the program altogether. To make things
- worse, the reporter next asked him to start up a word
- processor. Again, Pfeiffer, clicked his way around the
- desktop, but couldn't find nor start the program. Finally,
- he was asked to start up a game. You saw Pfeifer (now in
- deep trouble) clicking on all the tabs of the "easy to use"
- tab-works interface that is included on all Presario's,
- looking for games, while muttering "Were are ze games? I
- can't find ze games on zis machine!!!", his accent becoming
- increasingly more German then before. It was almost like Dr.
- Strangelove. The last shot is of a Compaq tech support guy,
- rushing in to help him out.... So much for ease of use....
-
- Voorburgwal 129, 1012 EP
- Amsterdam, The Netherlands).
-
- ------------------------------------------------------------------------------
-
- Ok, I'm going to assume that you already know a little bit about what it
- is you're reading. The DMS100/IBN (integrated business network) is
- composed of mainly electronic business sets, phones, data units, and
- attendant consoles and units, all physically at the customers place of
- business. While the digital switching software and support hardware is
- located at the Telco. Together, in tandem they work to give the customer
- one of the best combinations of features and benefits. The DMS-100
- combines voice AND data in one business comunications package. One of
- the many advantages is it offers the use with *any* sized business with
- up to 30,000 lines. The IBN system controls most operations, diagnoses
- problems, and also has the ability to do limited repairs on itself.
- Being modular, it can meet the needs at hand, and have the ability for
- new features, as time goes by, while still maintaining a cost-effective
- environment. Another advantage is that is uses a central attendant where
- and when needed. Along with Call Routing, or CDR, to control and
- restrict Long Distnace Calling, and network management. The IBN gives
- the user hassle free operation. Northern Telcom's DMS-100 switches,
- which by the way are digital, are frequently backed-up by their
- *higher trained* personnel, which isnt saying much. Some other features
- are: Automatic Routing Selection, or ARS, which routes the long distance
- calls, if they are even allowed, over the most economical (right) route
- available. Station Message Detail Recording, or SMDR, which basically
- does just what its name states, records long distance charges, including
- but not limited to, originating number, time and length of call,
- authorization code, and others... Yet another capability is the Direct
- Inward System Access (DISA), which gives the personnel the ability to use
- the system to place long distance calls cheaply, even from outside the
- company (sounds like a PBX a bit doesn't it?).
- System Features and Benefits: There are 6 Call Waiting Lamp Loop Keys,
- each with its associated source AND destination lamp to signify the
- status of both the calling and the called party status. The Second
- feature is Alpha Numeric Display Multiple Directory Number Feature Keys,
- up to 42 of them, which can be used for a Paging System, or speed
- dialing, and things along those lines. A third feature is the release
- Source/Release Destination Console, which features access to paging.
- Other features which mainly are unimportant I will list here, they are:
- Call Identifier Exclude Source/Exclude Destination. Remote Console Call
- Destination. Signal Source.Signal Destination. Call Holding. Call
- Detail Entry. Remote Console Call Selection. Console Display. Camp-on
- Automatic Recall Conference. A 6 port 2 way splitting non-delayed
- operation. Busy Verification of Lines. Manual and Automatic Hold.
- Multiple Console OPeration. Busy verification of trunks. Switched Loop
- Operation. Trunk Group Busy Indication. Uniform Call distribution form
- queue. Multiple listed directory numbers. Control of trunk group
- access. Secrecy. Night Service. Serial call. Speed Calling. Lockout.
- Delayed Operation. Position Busy. Interposition Calling. THrough Call
- Pickup. RIng Again. Multiple Directory Numbers. Intercom. Speed
- Call. Call Transfer/Conference. On-Hook Dialing. Additional
- Programmable Features include automatic hold. Listem-on hold. Multiple
- Appearance Directory Numbers, or MADN. Single Call Arrangement.
- Multiple Call Arrangement. Privacy Release. Tone Ringing with Volume
- Control. Call Waiting. Stored Number Redial. Private Business Line.
- And Finally a 32 character alphanumeric data unit. The DMS100/IBN can be
- used as a "standalone" or can be attached to the business set or other
- phone type unit. It has the ability to transmit over a two wire loop, at
- speeds of up to 56 kb per second, using a proprietary time compression
- multiplexing technology. The DMS100 is also available in different
- models to suit existing terminal capacities. It also provides integrated
- voice/data, that right data, communications. They, the phone company,
- and data unit, can operate together, simultaniously, or even independant
- of one another. Being fully digitized, it was one if the first switches
- to eliminate the use of those dinosaur analog modems (for which i still
- have a few if anyone wants to buy em off me or give me shipping money and
- ill send em to ya free). Well thats it for now. This should give you a
- good understanding of the capabilities of one of the many switches in use
- today. In fact, although outdated somewhat, my telco, citizens
- utilities, and one in stockton from what i just found out, is still using
- this switch (poor me in elk grove, ca eh?)
- which makes phreaking quite an easy task, not that it was really ever
- hard but anything to make it easier help. ANyway, if you have any
- comments/flames/general bullshit, mail it to either
- jmatrix@mindvox.phantom.com or capthook@sekurity.com the latter being a
- last resort email address.
- ciao
- ---Captain Hook
-
- ------------------------------------------------------------------------------