home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 37.5 KB | 1,159 lines |
- ==Phrack Magazine==
-
- Volume Six, Issue Forty-Seven, File 6 of 22
-
-
-
- 18. What is an Internet Outdial?
-
- An Internet outdial is a modem connected to the Internet than you can
- use to dial out. Normal outdials will only call local numbers. A GOD
- (Global OutDial) is capable of calling long distance. Outdials are an
- inexpensive method of calling long distance BBS's.
-
-
- 19. What are some Internet Outdials?
-
- This FAQ answer is excerpted from CoTNo #5:
-
- Internet Outdial List v3.0
- by Cavalier and DisordeR
-
-
- Introduction
- ------------
- There are several lists of Internet outdials floating around the net these
- days. The following is a compilation of other lists, as well as v2.0 by
- DeadKat(CoTNo issue 2, article 4). Unlike other lists where the author
- just ripped other people and released it, we have sat down and tested
- each one of these. Some of them we have gotten "Connection Refused" or
- it timed out while trying to connect...these have been labeled dead.
-
-
- Working Outdials
- ----------------
- as of 12/29/94
-
- NPA IP Address Instructions
- --- ---------- ------------
- 215 isn.upenn.edu modem
-
- 217 dialout.cecer.army.mil atdt x,xxxXXXXX
-
- 218 modem.d.umn.edu atdt9,xxxXXXX
-
- 303 yuma.acns.colostate.edu 3020
-
- 412 gate.cis.pitt.edu tn3270,
- connect dialout.pitt.edu,
- atdtxxxXXXX
-
- 413 dialout2400.smith.edu Ctrl } gets ENTER NUMBER: xxxxxxx
-
- 502 outdial.louisville.edu
-
- 502 uknet.uky.edu connect kecnet
- @ dial: "outdial2400 or out"
-
- 602 acssdial.inre.asu.edu atdt8,,,,,[x][yyy]xxxyyyy
-
- 614 ns2400.acs.ohio-state.edu
-
- 614 ns9600.acs.ohio-state.edu
-
- 713 128.249.27.153 atdt x,xxxXXXX
-
- 714 modem.nts.uci.edu atdt[area]0[phone]
-
- 804 ublan.virginia.edu connect hayes, 9,,xxx-xxxx
-
- 804 ublan2.acc.virginia.edu connect telnet
- connect hayes
-
-
-
- Need Password
- -------------
-
- 206 rexair.cac.washington.edu This is an unbroken password
- 303 yuma.ACNS.ColoState.EDU login: modem
- 404 128.140.1.239 .modem8|CR
- 415 annex132-1.EECS.Berkeley.EDU "dial1" or "dial2" or "dialer1"
- 514 cartier.CC.UMontreal.CA externe,9+number
- 703 wal-3000.cns.vt.edu dial2400 -aa
-
-
- Dead/No Connect
- ---------------
-
- 201 idsnet
- 202 modem.aidt.edu
- 204 dial.cc.umanitoba.ca
- 204 umnet.cc.manitoba.ca "dial12" or "dial24"
- 206 dialout24.cac.washington.edu
- 207 modem-o.caps.maine.edu
- 212 B719-7e.NYU.EDU dial3/dial12/dial24
- 212 B719-7f.NYU.EDU dial3/dial12/dial24
- 212 DIALOUT-1.NYU.EDU dial3/dial12/dial24
- 212 FREE-138-229.NYU.EDU dial3/dial12/dial24
- 212 UP19-4b.NYU.EDU dial3/dial12/dial24
- 215 wiseowl.ocis.temple.edu "atz" "atdt 9xxxyyyy"
- 218 aa28.d.umn.edu "cli" "rlogin modem"
- at "login:" type "modem"
- 218 modem.d.umn.edu Hayes 9,XXX-XXXX
- 301 dial9600.umd.edu
- 305 alcat.library.nova.edu
- 305 office.cis.ufl.edu
- 307 modem.uwyo.edu Hayes 0,XXX-XXXX
- 313 35.1.1.6 dial2400-aa or dial1200-aa
- or dialout
- 402 dialin.creighton.edu
- 402 modem.criegthon.edu
- 404 broadband.cc.emory.edu ".modem8" or ".dialout"
- 408 dialout.scu.edu
- 408 dialout1200.scu.edu
- 408 dialout2400.scu.edu
- 408 dialout9600.scu.edu
- 413 dialout.smith.edu
- 414 modems.uwp.edu
- 416 annex132.berkely.edu atdt 9,,,,, xxx-xxxx
- 416 pacx.utcs.utoronto.ca modem
- 503 dialout.uvm.edu
- 513 dialout24.afit.af.mil
- 513 r596adi1.uc.edu
- 514 pacx.CC.UMontreal.CA externe#9 9xxx-xxxx
- 517 engdial.cl.msu.edu
- 602 dial9600.telcom.arizona.edu
- 603 dialout1200.unh.edu
- 604 dial24-nc00.net.ubc.ca
- 604 dial24-nc01.net.ubc.ca
- 604 dial96-np65.net.ubc.ca
- 604 gmodem.capcollege.bc.ca
- 604 hmodem.capcollege.bc.ca
- 609 128.119.131.11X (X= 1 - 4) Hayes
- 609 129.119.131.11x (x = 1 to 4)
- 609 wright-modem-1.rutgers.edu
- 609 wright-modem-2.rutgers.edu
- 612 modem_out12e7.atk.com
- 612 modem_out24n8.atk.com
- 614 ns2400.ircc.ohio-state.edu "dial"
- 615 dca.utk.edu dial2400 D 99k #
- 615 MATHSUN23.MATH.UTK.EDU dial 2400 d 99Kxxxxxxx
- 616 modem.calvin.edu
- 617 128.52.30.3 2400baud
- 617 dialout.lcs.mit.edu
- 617 dialout1.princeton.edu
- 617 isdn3.Princeton.EDU
- 617 jadwingymkip0.Princeton.EDU
- 617 lord-stanley.Princeton.EDU
- 617 mpanus.Princeton.EDU
- 617 mrmodem.wellesley.edu
- 617 old-dialout.Princeton.EDU
- 617 stagger.Princeton.EDU
- 617 sunshine-02.lcs.mit.edu
- 617 waddle.Princeton.EDU
- 619 128.54.30.1 atdt [area][phone]
- 619 dialin.ucsd.edu "dialout"
- 703 modem_pool.runet.edu
- 703 wal-3000.cns.vt.edu
- 713 128.249.27.154 "c modem96" "atdt 9xxx-xxxx"
- or "Hayes"
- 713 modem12.bcm.tmc.edu
- 713 modem24.bcm.tmc.edu
- 713 modem24.bcm.tmc.edu
- 714 mdmsrv7.sdsu.edu atdt 8xxx-xxxx
- 714 modem24.nts.uci.edu
- 714 pub-gopher.cwis.uci.edu
- 801 dswitch.byu.edu "C Modem"
- 808 irmodem.ifa.hawaii.edu
- 902 star.ccs.tuns.ca "dialout"
- 916 129.137.33.72
- 916 cc-dnet.ucdavis.edu connect hayes/dialout
- 916 engr-dnet1.engr.ucdavis.edu UCDNET <ret> C KEYCLUB <ret>
- ??? 128.119.131.11X (1 - 4)
- ??? 128.200.142.5
- ??? 128.54.30.1 nue, X to discontinue, ? for Help
- ??? 128.6.1.41
- ??? 128.6.1.42
- ??? 129.137.33.72
- ??? 129.180.1.57
- ??? 140.112.3.2 ntu <none>
- ??? annexdial.rz.uni-duesseldorf.de
- ??? dial96.ncl.ac.uk
- ??? dialout.plk.af.mil
- ??? ee21.ee.ncu.edu.tw cs8005
- ??? im.mgt.ncu.edu.tw guest <none>
- ??? modem.cis.uflu.edu
- ??? modem.ireq.hydro.qc.ca
- ??? modems.csuohio.edu
- ??? sparc20.ncu.edu.tw u349633
- ??? sun2cc.nccu.edu.tw ?
- ??? ts-modem.une.oz.au
- ??? twncu865.ncu.edu.tw guest <none>
- ??? vtnet1.cns.ut.edu "CALL" or "call"
-
-
- Conclusion
- ----------
- If you find any of the outdials to have gone dead, changed commands,
- or require password, please let us know so we can keep this list as
- accurate as possible. If you would like to add to the list, feel free
- to mail us and it will be included in future versions of this list,
- with your name beside it. Have fun...
-
- [Editors note: Updates have been made to this document after
- the original publication]
-
-
- 20. What is this system?
-
-
- AIX
- ~~~
- IBM AIX Version 3 for RISC System/6000
- (C) Copyrights by IBM and by others 1982, 1990.
- login:
-
- [You will know an AIX system because it is the only Unix system that]
- [clears the screen and issues a login prompt near the bottom of the]
- [screen]
-
-
- AS/400
- ~~~~~~
- UserID?
- Password?
-
- Once in, type GO MAIN
-
-
- CDC Cyber
- ~~~~~~~~~
- WELCOME TO THE NOS SOFTWARE SYSTEM.
- COPYRIGHT CONTROL DATA 1978, 1987.
-
- 88/02/16. 02.36.53. N265100
- CSUS CYBER 170-730. NOS 2.5.2-678/3.
- FAMILY:
-
- You would normally just hit return at the family prompt. Next prompt is:
-
- USER NAME:
-
-
- CISCO Router
- ~~~~~~~~~~~~
- FIRST BANK OF TNO
- 95-866 TNO VirtualBank
- REMOTE Router - TN043R1
-
- Console Port
-
- SN - 00000866
-
- TN043R1>
-
-
- DECserver
- ~~~~~~~~~
- DECserver 700-08 Communications Server V1.1 (BL44G-11A) - LAT V5.1
- DPS502-DS700
-
- (c) Copyright 1992, Digital Equipment Corporation - All Rights Reserved
-
- Please type HELP if you need assistance
-
- Enter username> TNO
-
- Local>
-
-
- Hewlett Packard MPE-XL
- ~~~~~~~~~~~~~~~~~~~~~~
- MPE XL:
- EXPECTED A :HELLO COMMAND. (CIERR 6057)
- MPE XL:
- EXPECTED [SESSION NAME,] USER.ACCT [,GROUP] (CIERR 1424)
- MPE XL:
-
-
- GTN
- ~~~
- WELCOME TO CITIBANK. PLEASE SIGN ON.
- XXXXXXXX
-
- @
- PASSWORD =
-
- @
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- PLEASE ENTER YOUR ID:-1->
- PLEASE ENTER YOUR PASSWORD:-2->
-
- CITICORP (CITY NAME). KEY GHELP FOR HELP.
- XXX.XXX
- PLEASE SELECT SERVICE REQUIRED.-3->
-
-
- Lantronix Terminal Server
- ~~~~~~~~~~~~~~~~~~~~~~~~~
- Lantronix ETS16 Version V3.1/1(940623)
-
- Type HELP at the 'Local_15> ' prompt for assistance.
-
- Login password>
-
-
- Meridian Mail (Northern Telecom Phone/Voice Mail System)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- MMM MMMERIDIAN
- MMMMM MMMMM
- MMMMMM MMMMMM
- MMM MMMMM MMM MMMMM MMMMM
- MMM MMM MMM MMMMMM MMMMMM
- MMM MMM MMM MMM MMM MMM
- MMM MMM MMM MMMMM MMM
- MMM MMM MMM MMM MMM
- MMM MMM MMM MMM
- MMM MMM MMM MMM
- MMM MMM MMM MMM
- MMM MMM MMM MMM
- MMM MMM MMM MMM
-
- Copyright (c) Northern Telecom, 1991
-
-
- Novell ONLAN
- ~~~~~~~~~~~~
- N
-
- [To access the systems it is best to own a copy of ONLAN/PC]
-
-
- PC-Anywhere
- ~~~~~~~~~~~
- P
-
- [To access the systems it is best to own a copy of PCAnywhere Remote]
-
-
- PRIMOS
- ~~~~~~
- PRIMENET 19.2.7F PPOA1
-
- <any text>
-
- ER!
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- CONNECT
- Primenet V 2.3 (system)
- LOGIN (you)
- User id? (system)
- SAPB5 (you)
- Password? (system)
- DROWSAP (you)
- OK, (system)
-
-
- ROLM-OSL
- ~~~~~~~~
- MARAUDER10292 01/09/85(^G) 1 03/10/87 00:29:47
- RELEASE 8003
- OSL, PLEASE.
- ?
-
-
- System75
- ~~~~~~~~
- Login: root
- INCORRECT LOGIN
-
- Login: browse
- Password:
-
- Software Version: G3s.b16.2.2
-
- Terminal Type (513, 4410, 4425): [513]
-
-
- Tops-10
- ~~~~~~~
- NIH Timesharing
-
- NIH Tri-SMP 7.02-FF 16:30:04 TTY11
- system 1378/1381/1453 Connected to Node Happy(40) Line # 12
- Please LOGIN
- .
-
-
- VM/370
- ~~~~~~
- VM/370
- !
-
-
- VM/ESA
- ~~~~~~
- VM/ESA ONLINE
-
- TBVM2 VM/ESA Rel 1.1 PUT 9200
-
- Fill in your USERID and PASSWORD and press ENTER
- (Your password will not appear when you type it)
- USERID ===>
- PASSWORD ===>
-
- COMMAND ===>
-
-
- Xylogics Annex Communications Server
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Annex Command Line Interpreter * Copyright 1991 Xylogics, Inc.
-
- Checking authorization, Please wait...
- Annex username: TNO
- Annex password:
-
- Permission granted
- annex:
-
-
- 21. What are the default accounts for XXX?
-
- AIX
- ~~~
- guest guest
-
-
- AS/400
- ~~~~~~
- qsecofr qsecofr /* master security officer */
- qsysopr qsysopr /* system operator */
- qpgmr qpgmr /* default programmer */
-
- also
-
- ibm/password
- ibm/2222
- ibm/service
- qsecofr/1111111
- qsecofr/2222222
- qsvr/qsvr
- secofr/secofr
-
-
- DECserver
- ~~~~~~~~~
- ACCESS
- SYSTEM
-
-
- Dynix (The library software, not the UnixOS)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- (Type 'later' to exit to the login prompt)
- setup <no password>
- library <no password>
- circ <9 digit number>
-
-
- Hewlett Packard MPE-XL
- ~~~~~~~~~~~~~~~~~~~~~~
- HELLO MANAGER.SYS
- HELLO MGR.SYS
- HELLO FIELD.SUPPORT HPUNSUP or SUPPORT or HP
- HELLO OP.OPERATOR
- MGR CAROLIAN
- MGR CCC
- MGR CNAS
- MGR CONV
- MGR COGNOS
- OPERATOR COGNOS
- MANAGER COGNOS
- OPERATOR DISC
- MGR HPDESK
- MGR HPWORD
- FIELD HPWORD
- MGR HPOFFICE
- SPOOLMAN HPOFFICE
- ADVMAIL HPOFFICE
- MAIL HPOFFICE
- WP HPOFFICE
- MANAGER HPOFFICE
- MGR HPONLY
- FIELD HPP187
- MGR HPP187
- MGR HPP189
- MGR HPP196
- MGR INTX3
- MGR ITF3000
- MANAGER ITF3000
- MAIL MAIL
- MGR NETBASE
- MGR REGO
- MGR RJE
- MGR ROBELLE
- MANAGER SECURITY
- MGR SECURITY
- FIELD SERVICE
- MANAGER SYS
- MGR SYS
- PCUSER SYS
- RSBCMON SYS
- OPERATOR SYS
- OPERATOR SYSTEM
- FIELD SUPPORT
- OPERATOR SUPPORT
- MANAGER TCH
- MAIL TELESUP
- MANAGER TELESUP
- MGR TELESUP
- SYS TELESUP
- MGE VESOFT
- MGE VESOFT
- MGR WORD
- MGR XLSERVER
-
- Common jobs are Pub, Sys, Data
- Common passwords are HPOnly, TeleSup, HP, MPE, Manager, MGR, Remote
-
-
- Major BBS
- ~~~~~~~~~
- Sysop Sysop
-
-
- Mitel PBX
- ~~~~~~~~~
- SYSTEM
-
-
- Nomadic Computing Environment (NCE) on the Tadpole Technologies SPARCBook3
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- fax <no password>
-
-
- PICK O/S
- ~~~~~~~~
- DSA # Desquetop System Administrator
- DS
- DESQUETOP
- PHANTOM
-
-
- Prolog
- ~~~~~~
- PBX PBX
- NETWORK NETWORK
- NETOP <null>
-
-
- Rolm
- ~~~~
- CBX Defaults
-
- op op
- op operator
- su super
- admin pwp
- eng engineer
-
-
- PhoneMail Defaults
-
- sysadmin sysadmin
- tech tech
- poll tech
-
-
- RSX
- ~~~
- SYSTEM/SYSTEM (Username SYSTEM, Password SYSTEM)
- 1,1/system (Directory [1,1] Password SYSTEM)
- BATCH/BATCH
- SYSTEM/MANAGER
- USER/USER
-
- Default accounts for Micro/RSX:
-
- MICRO/RSX
-
- Alternately you can hit <CTRL-Z> when the boot sequence asks you for the
- date and create an account using:
-
- RUN ACNT
- or RUN $ACNT
-
- (Numbers below 10 {oct} are Priveleged)
-
- Reboot and wait for the date/time question. Type ^C and at the MCR prompt,
- type "abo at." You must include the . dot!
-
- If this works, type "acs lb0:/blks=1000" to get some swap space so the
- new step won't wedge.
-
- type " run $acnt" and change the password of any account with a group
- number of 7 or less.
-
- You may find that the ^C does not work. Try ^Z and ESC as well.
- Also try all 3 as terminators to valid and invalid times.
-
- If none of the above work, use the halt switch to halt the system,
- just after a invalid date-time. Look for a user mode PSW 1[4-7]xxxx.
- then deposit 177777 into R6, cross your fingers, write protect the drive
- and continue the system. This will hopefully result in indirect blowing
- up... And hopefully the system has not been fully secured.
-
-
- SGI Irix
- ~~~~~~~~
- 4DGifts <no password>
- guest <no password>
- demos <no password>
- lp <no password>
- nuucp <no password>
- tour <no password>
- tutor <no password>
-
-
- System 75
- ~~~~~~~~~
- bcim bcimpw
- bciim bciimpw
- bcms bcmspw, bcms
- bcnas bcnspw
- blue bluepw
- browse looker, browsepw
- craft crftpw, craftpw, crack
- cust custpw
- enquiry enquirypw
- field support
- inads indspw, inadspw, inads
- init initpw
- kraft kraftpw
- locate locatepw
- maint maintpw, rwmaint
- nms nmspw
- rcust rcustpw
- support supportpw
- tech field
-
-
- Taco Bell
- ~~~~~~~~~
- rgm rollout
- tacobell <null>
-
-
- Verifone Junior 2.05
- ~~~~~~~~~~~~~~~~~~~~
- Default password: 166816
-
-
- VMS
- ~~~
- field service
- systest utep
-
-
- XON / XON Junior
- ~~~~~~~~~~~~~~~~
- Default password: 166831
-
-
- 22. What port is XXX on?
-
- The file /etc/services on most Unix machines lists the port
- assignments for that machine. For a complete list of port
- assignments, read RFC (Request For Comments) 1700 "Assigned Numbers"
-
-
- 23. What is a trojan/worm/virus/logic bomb?
-
- This FAQ answer was written by Theora:
-
- Trojan:
-
- Remember the Trojan Horse? Bad guys hid inside it until they could
- get into the city to do their evil deed. A trojan computer program is
- similar. It is a program which does an unauthorized function, hidden
- inside an authorized program. It does something other than what it
- claims to do, usually something malicious (although not necessarily!),
- and it is intended by the author to do whatever it does. If it's not
- intentional, its called a 'bug' or, in some cases, a feature :) Some
- virus scanning programs detect some trojans. Some virus scanning
- programs don't detect any trojans. No virus scanners detect all
- trojans.
-
- Virus:
-
- A virus is an independent program which reproduces itself. It may
- attach to other programs, it may create copies of itself (as in
- companion viruses). It may damage or corrupt data, change data, or
- degrade the performance of your system by utilizing resources such as
- memory or disk space. Some virus scanners detect some viruses. No
- virus scanners detect all viruses. No virus scanner can protect
- against "any and all viruses, known and unknown, now and forevermore".
-
- Worm:
-
- Made famous by Robert Morris, Jr. , worms are programs which reproduce
- by copying themselves over and over, system to system, using up
- resources and sometimes slowing down the systems. They are self
- contained and use the networks to spread, in much the same way viruses
- use files to spread. Some people say the solution to viruses and
- worms is to just not have any files or networks. They are probably
- correct. We would include computers.
-
- Logic Bomb:
-
- Code which will trigger a particular form of 'attack' when a
- designated condition is met. For instance, a logic bomb could delete
- all files on Dec. 5th. Unlike a virus, a logic bomb does not make
- copies of itself.
-
-
- 24. How can I protect myself from viruses and such?
-
- This FAQ answer was written by Theora:
-
- The most common viruses are boot sector infectors. You can help
- protect yourself against those by write protecting all disks which you
- do not need write access to. Definitely keep a set of write protected
- floppy system disks. If you get a virus, it will make things much
- simpler. And, they are good for coasters. Only kidding.
-
- Scan all incoming files with a recent copy of a good virus scanner.
- Among the best are F-Prot, Dr. Solomon's Anti-virus Toolkit, and
- Thunderbyte Anti-Virus. AVP is also a good proggie. Using more than
- one scanner could be helpful. You may get those one or two viruses
- that the other guy happened to miss this month.
-
- New viruses come out at the rate of about 8 per day now. NO scanner
- can keep up with them all, but the four mentioned here do the best job
- of keeping current. Any _good_ scanner will detect the majority of
- common viruses. No virus scanner will detect all viruses.
-
- Right now there are about 5600 known viruses. New ones are written
- all the time. If you use a scanner for virus detection, you need to
- make sure you get frequent updates. If you rely on behaviour
- blockers, you should know that such programs can be bypassed easily by
- a technique known as tunnelling.
-
- You may want to use integrity checkers as well as scanners. Keep in
- mind that while these can supply added protection, they are not
- foolproof.
-
- You may want to use a particular kind of scanner, called resident
- scanners. Those are programs which stay resident in the computer
- memory and constantly monitor program execution (and sometimes even
- access to the files containing programs). If you try to execute a
- program, the resident scanner receives control and scans it first for
- known viruses. Only if no such viruses are found, the program is
- allowed to execute.
-
- Most virus scanners will not protect you against many kinds of
- trojans, any sort of logic bombs, or worms. Theoretically, they
- _could_ protect you against logic bombs and/or worms, by addition of
- scanning strings; however, this is rarely done.
-
- The best, actually only way, to protect yourself is to know what you
- have on your system and make sure what you have there is authorised by
- you. Make freqent backups of all important files. Keep your DOS
- system files write protected. Write protect all disks that you do not
- need to write to. If you do get a virus, don't panic. Call the
- support department of the company who supplies your anti-virus product
- if you aren't sure of what you are doing. If the company you got your
- anti-virus software from does not have a good technical support
- department, change companies.
-
- The best way to make sure viruses are not spread is not to spread
- them. Some people do this intentionally. We discourage this. Viruses
- aren't cool.
-
-
- 25. Where can I get more information about viruses?
-
- This FAQ answer was written by Theora:
-
- Assembly lanaguage programming books illustrate the (boring) aspect of
- replication and have for a long time. The most exciting/interesting
- thing about viruses is all the controversy around them. Free speech,
- legality, and cute payloads are a lot more interesting than "find
- first, find next" calls. You can get information about the technical
- aspects of viruses, as well as help if you should happen to get a
- virus, from the virus-l FAQ, posted on comp. virus every so often.
- You can also pick up on the various debates there. There are
- alt.virus type newsgroups, but the level of technical expertise is
- minimal, and so far at least there has not been a lot of real "help"
- for people who want to get -rid- of a virus.
-
- There are a lot of virus experts. To become one, just call yourself
- one. Only Kidding. Understanding viruses involves understanding
- programming, operating systems, and their interaction. Understanding
- all of the 'Cult of Virus' business requires a lot of discernment.
- There are a number of good papers available on viruses, and the Cult
- of Virus; you can get information on them from just about anyone
- listed in the virus-l FAQ. The FTP site ftp.informatik.uni-hamburg.de
- is a pretty reliable site for proggies and text.
-
-
- 26. What is Cryptoxxxxxxx?
-
- This FAQ answer is excerpted from: Computer Security Basics
- by Deborah Russell
- and G.T. Gengemi Sr.
-
- A message is called either plaintext or cleartext. The process of
- disguising a message in such a way as to hide its substance is called
- encryption. An encrypted message is called ciphertext. The process
- of turning ciphertext back into plaintext is called decryption.
-
- The art and science of keeping messages secure is called cryptography,
- and it is practiced by cryptographers. Cryptanalysts are
- practitioners of cryptanalysis, the art and science of breaking
- ciphertext, i.e. seeing through the disguise. The branch of
- mathematics embodying both cryptography and cryptanalysis is called
- cryptology, and it's practitioners are called cryptologists.
-
-
- 27. What is PGP?
-
- This FAQ answer is excerpted from: PGP(tm) User's Guide
- Volume I: Essential Topics
- by Philip Zimmermann
-
- PGP(tm) uses public-key encryption to protect E-mail and data files.
- Communicate securely with people you've never met, with no secure
- channels needed for prior exchange of keys. PGP is well featured and
- fast, with sophisticated key management, digital signatures, data
- compression, and good ergonomic design.
-
- Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a
- high security cryptographic software application for MS-DOS, Unix,
- VAX/VMS, and other computers. PGP allows people to exchange files or
- messages with privacy, authentication, and convenience. Privacy means
- that only those intended to receive a message can read it.
- Authentication means that messages that appear to be from a particular
- person can only have originated from that person. Convenience means
- that privacy and authentication are provided without the hassles of
- managing keys associated with conventional cryptographic software. No
- secure channels are needed to exchange keys between users, which makes
- PGP much easier to use. This is because PGP is based on a powerful
- new technology called "public key" cryptography.
-
- PGP combines the convenience of the Rivest-Shamir-Adleman (RSA)
- public key cryptosystem with the speed of conventional cryptography,
- message digests for digital signatures, data compression before
- encryption, good ergonomic design, and sophisticated key management.
- And PGP performs the public-key functions faster than most other
- software implementations. PGP is public key cryptography for the
- masses.
-
-
- 28. What is Tempest?
-
- Tempest stands for Transient Electromagnetic Pulse Surveillance
- Technology.
-
- Computers and other electronic equipment release interference to their
- surrounding environment. You may observe this by placing two video
- monitors close together. The pictures will behave erratically until
- you space them apart.
-
- Although most of the time these emissions are simply annoyances, they
- can sometimes be very helpful. Suppose we wanted to see what project
- a target was working on. We could sit in a van outside her office and
- use sensitive electronic equipment to attempt to pick up and decipher
- the emanations from her video monitor.
-
- Our competitor, however, could shield the emanations from her
- equipment or use equipment without strong emanations.
-
- Tempest is the US Government program for evaluation and endorsement
- of electronic equipment that is safe from eavesdropping.
-
-
- 29. What is an anonymous remailer?
-
- An anonymous remailer is a system on the Internet that allows you to
- send e-mail anonymously or post messages to Usenet anonymously.
-
- You apply for an anonymous ID at the remailer site. Then, when you
- send a message to the remailer, it sends it out from your anonymous ID
- at the remailer. No one reading the post will know your real account
- name or host name. If someone sends a message to your anonymous ID,
- it will be forwarded to your real account by the remailer.
-
-
- 30. What are the addresses of some anonymous remailers?
-
- The most popular and stable anonymous remailer is anon.penet.fi,
- operated by Johan Helsingus. To obtain an anonymous ID, mail
- ping@anon.penet.fi. For assistance is obtaining an anonymous account
- at penet, mail help@anon.penet.fi.
-
- To see a list on anonymous remailers, finger
- remailer-list@kiwi.cs.berkeley.edu.
-
-
- 31. How do I defeat Copy Protection?
-
- There are two common methods of defeating copy protection. The first
- is to use a program that removes copy protection. Popular programs
- that do this are CopyIIPC from Central Point Software and CopyWrite
- from Quaid Software. The second method involves patching the copy
- protected program. For popular software, you may be able to locate a
- ready made patch. You can them apply the patch using any hex editor,
- such as debug or the Peter Norton's DiskEdit. If you cannot, you must
- patch the software yourself.
-
- Writing a patch requires a debugger, such as Soft-Ice or Sourcer. It
- also requires some knowledge of assembly language. Load the protected
- program under the debugger and watch for it to check the protection
- mechanism. When it does, change that portion of the code. The code
- can be changed from JE (Jump on Equal) or JNE (Jump On Not Equal) to
- JMP (Jump Unconditionally). Or the code may simply be replaced with
- NOP (No Operation) instructions.
-
-
- 32. What is 127.0.0.1?
-
- 127.0.0.1 is a loopback network connection. If you telnet, ftp, etc...
- to it you are connected to your own machine.
-
-
- 33. How do I post to a moderated newsgroup?
-
- Usenet messages consist of message headers and message bodies. The
- message header tells the news software how to process the message.
- Headers can be divided into two types, required and optional. Required
- headers are ones like "From" and "Newsgroups." Without the required
- headers, your message will not be posted properly.
-
- One of the optional headers is the "Approved" header. To post to a
- moderated newsgroup, simply add an Approved header line to your
- message header. The header line should contain the newsgroup
- moderators e-mail address. To see the correct format for your target
- newsgroup, save a message from the newsgroup and then look at it using
- any text editor.
-
- A "Approved" header line should look like this:
-
- Approved: will@gnu.ai.mit.edu
-
- There cannot not be a blank line in the message header. A blank line
- will cause any portion of the header after the blank line to be
- interpreted as part of the message body.
-
- For more information, read RFC 1036: Standard for Interchange of
- USENET messages.
-
-
-
-
- Section B: Telephony
- ~~~~~~~~~~~~~~~~~~~~
-
- 01. What is a Red Box?
-
- When a coin is inserted into a payphone, the payphone emits a set of
- tones to ACTS (Automated Coin Toll System). Red boxes work by fooling
- ACTS into believing you have actually put money into the phone. The
- red box simply plays the ACTS tones into the telephone microphone.
- ACTS hears those tones, and allows you to place your call. The actual
- tones are:
-
- Nickel Signal 1700+2200 0.060s on
- Dime Signal 1700+2200 0.060s on, 0.060s off, twice repeating
- Quarter Signal 1700+2200 33ms on, 33ms off, 5 times repeating
-
-
- 02. How do I build a Red Box?
-
- Red boxes are commonly manufactured from modified Radio Shack tone
- dialers, Hallmark greeting cards, or made from scratch from readily
- available electronic components.
-
- To make a Red Box from a Radio Shack 43-141 or 43-146 tone dialer,
- open the dialer and replace the crystal with a new one.
- The purpose of the new crystal is to cause the * button on your tone
- dialer to create a 1700Mhz and 2200Mhz tone instead of the original
- 941Mhz and 1209Mhz tones. The exact value of the replacement crystal
- should be 6.466806 to create a perfect 1700Mhz tone and 6.513698 to
- create a perfect 2200mhz tone. A crystal close to those values will
- create a tone that easily falls within the loose tolerances of ACTS.
- The most popular choice is the 6.5536Mhz crystal, because it is the
- eaiest to procure. The old crystal is the large shiny metal component
- labeled "3.579545Mhz." When you are finished replacing the crystal,
- program the P1 button with five *'s. That will simulate a quarter
- tone each time you press P1.
-
-
- 03. Where can I get a 6.5536Mhz crystal?
-
- Your best bet is a local electronics store. Radio Shack sells them,
- but they are overpriced and the store must order them in. This takes
- approximately two weeks. In addition, many Radio Shack employees do
- not know that this can be done.
-
- Or, you could order the crystal mail order. This introduces Shipping
- and Handling charges, which are usually much greater than the price of
- the crystal. It's best to get several people together to share the
- S&H cost. Or, buy five or six yourself and sell them later. Some of
- the places you can order crystals are:
-
- Digi-Key
- 701 Brooks Avenue South
- P.O. Box 677
- Thief River Falls, MN 56701-0677
- (80)344-4539
- Part Number:X415-ND /* Note: 6.500Mhz and only .197 x .433 x .149! */
- Part Number:X018-ND
-
- JDR Microdevices:
- 2233 Branham Lane
- San Jose, CA 95124
- (800)538-5000
- Part Number: 6.5536MHZ
-
- Tandy Express Order Marketing
- 401 NE 38th Street
- Fort Worth, TX 76106
- (800)241-8742
- Part Number: 10068625
-
- Alltronics
- 2300 Zanker Road
- San Jose CA 95131
- (408)943-9774 Voice
- (408)943-9776 Fax
- (408)943-0622 BBS
- Part Number: 92A057
-
-
- 04. Which payphones will a Red Box work on?
-
- Red Boxes will work on TelCo owned payphones, but not on COCOT's
- (Customer Owned Coin Operated Telephones).
-
- Red boxes work by fooling ACTS (Automated Coin Toll System) into
- believing you have put money into the pay phone. ACTS is the
- telephone company software responsible for saying "Please deposit XX
- cents" and listening for the coins being deposited.
-
- COCOT's do not use ACTS. On a COCOT, the pay phone itself is
- responsible for determining what coins have been inserted.
-
-
- 05. How do I make local calls with a Red Box?
-
- Payphones do not use ACTS for local calls. To use your red box for
- local calls, you have to fool ACTS into getting involved in the call.
-
- One way to do this, in some areas, is by dialing 10288-xxx-xxxx. This
- makes your call a long distance call, and brings ACTS into the
- picture.
-
- In other areas, you can call Directory Assistance and ask for the
- number of the person you are trying to reach. The operator will give
- you the number and then you will hear a message similar to "Your call
- can be completed automatically for an additional 35 cents." When this
- happens, you can then use ACTS tones.
-
-
- 06. What is a Blue Box?
-
- Blue boxes use a 2600hz tone to size control of telephone switches
- that use in-band signalling. The caller may then access special
- switch functions, with the usual purpose of making free long distance
- phone calls, using the tones provided by the Blue Box.
-
-
- 07. Do Blue Boxes still work?
-
- Blue Boxes still work in areas using in band signalling. Modern phone
- switches use out of band signalling. Nothing you send over the voice
- portion of bandwidth can control the switch. If you are in an area
- served by a switch using out of band signalling, you can still blue
- box by calling through an area served by older in-band equipment.
-
-
- 08. What is a Black Box?
-
- A Black Box is a 1.8k ohm resistor placed across your phone line to
- cause the phone company equipment to be unable to detect that you have
- answered your telephone. People who call you will then not be billed
- for the telephone call. Black boxes do not work under ESS.
-
-
- 09. What do all the colored boxes do?
-
- Acrylic Steal Three-Way-Calling, Call Waiting and programmable
- Call Forwarding on old 4-wire phone systems
- Aqua Drain the voltage of the FBI lock-in-trace/trap-trace
- Beige Lineman's hand set
- Black Allows the calling party to not be billed for the call
- placed
- Blast Phone microphone amplifier
- Blotto Supposedly shorts every fone out in the immediate area
- Blue Emulate a true operator by seizing a trunk with a 2600hz
- tone
- Brown Create a party line from 2 phone lines
- Bud Tap into your neighbors phone line
- Chartreuse Use the electricity from your phone line
- Cheese Connect two phones to create a diverter
- Chrome Manipulate Traffic Signals by Remote Control
- Clear A telephone pickup coil and a small amp used to make free
- calls on Fortress Phones
- Color Line activated telephone recorder
- Copper Cause crosstalk interference on an extender
- Crimson Hold button
- Dark Re-route outgoing or incoming calls to another phone
- Dayglo Connect to your neighbors phone line
- Divertor Re-route outgoing or incoming calls to another phone
- DLOC Create a party line from 2 phone lines
- Gold Dialout router
- Green Emulate the Coin Collect, Coin Return, and Ringback tones
- Infinity Remotely activated phone tap
- Jack Touch-Tone key pad
- Light In-use light
- Lunch AM transmitter
- Magenta Connect a remote phone line to another remote phone line
- Mauve Phone tap without cutting into a line
- Neon External microphone
- Noise Create line noise
- Olive External ringer
- Party Create a party line from 2 phone lines
- Pearl Tone generator
- Pink Create a party line from 2 phone lines
- Purple Telephone hold button
- Rainbow Kill a trace by putting 120v into the phone line (joke)
- Razz Tap into your neighbors phone
- Red Make free phone calls from pay phones by generating
- quarter tones
- Rock Add music to your phone line
- Scarlet Cause a neighbors phone line to have poor reception
- Silver Create the DTMF tones for A, B, C and D
- Static Keep the voltage on a phone line high
- Switch Add hold, indicator lights, conferencing, etc..
- Tan Line activated telephone recorder
- Tron Reverse the phase of power to your house, causing your
- electric meter to run slower
- TV Cable "See" sound waves on your TV
- Urine Create a capacitative disturbance between the ring and
- tip wires in another's telephone headset
- Violet Keep a payphone from hanging up
- White Portable DTMF keypad
- Yellow Add an extension phone
-
- Box schematics may be retrieved from these FTP sites:
-
- ftp.netcom.com /pub/br/bradleym
- ftp.netcom.com /pub/va/vandal
- ftp.winternet.com /users/craigb
-
-