💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › NUMBERS › carrier1.txt captured on 2022-06-12 at 17:34:54.

View Raw

More Information

-=-=-=-=-=-=-

---------------------------------------------------------------------------
The Carrier Wave (ISSN 1086-0118) Volume I, Number I, October 1995
---------------------------------------------------------------------------

------------------------
info
------------------------

Publisher:      Tobin Fricke
Email:          fricke@roboben.engr.ucdavis.edu
Subscriptions:  $16 annually
Cover Price:    $4.00 (us)
ISSN:           1086-0118
Issue:          Volume I, Number I
Date:           October 1995
Address:        PO Box 835, Lake Forest, CA 92630
Copyright:      1995 by Tobin Fricke, rights to individual articles
                remain with their respective authors

------------------------
preface to ascii version
------------------------

Welcome to The Carrier Wave <TCW>.  Attached is Issue One in ASCII format.
TCW is primarily distributed in a printed hard-copy format.  This is a
mere beautified-ASCII rendition of it, so all frames, formats, effects,
tables, illustrations etc have been eliminated.

The Carrier Wave is published approximately quarterly.
Subscriptions are on a per-issue basis at $4.00 per issue.  TCW is
$4.00 per issue through subscription, newstand, or if you get it
directly from me.

For a subscription, mail $16.00 for four issues to our address.  For every
printed issue that you are sent, you will receive the electronic
version <this> emailed to you if you wish.

See the end of this document for further subscription information.

Keep in mind that the printed version looks much much much nicer than
this ASCII version.  It is printed on 11"x17" paper folded in half like
a book, so it's 8.5"x11" -- standard letter paper size.

+-----------------------------------------------------------------------+
|                             The Carrier Wave                          |
|                                                                       |
| Volume I, Issue I                                     October 1995    |
+-----------------------------------------------------------------------+

Copyright (c) 1995 by Tobin Fricke, All Rights Reserved
Individual authors maintain copyright and responsibility
for their submissions.

Unauthorized duplication or use prohibited.
May not be sold.

+-------------------------------------------------------------+
|                                                             |
|  INSIDE!                                                    |
+---------------------------------------------------+---------+
|  From The Editor: Light Ray Speaks                |         |
|  Read This!                                       |     1   |
+---------------------------------------------------+---------+
| San Remo TV Hack                                  |         |
| Members of STUPH hacked the cable television      |         |
| system at the Hotel San Remo while at DefCon.     |   2     |
| Here's how they did it!                           |         |
+---------------------------------------------------+---------+
| Variation On A DefCon                             |   3     |
| Bucket Man's Def Con Experience                   |         |
+---------------------------------------------------+---------+
| Haqs                                              |         |
| Electronic Shoplifting Countermeasures and        |   5     |
| more!  The Hacks of the Month!                    |         |
+---------------------------------------------------+---------+
| The Red Box                                       |         |
| Free phone calls from payphones. Here's how.      |   8     |
+---------------------------------------------------+---------+
| EMail: The Real Killer App - Future and Impact    |         |
| Electronic Mail is the real killer app.  Here     |         |
| is why.                                           |         |
+---------------------------------------------------+---------+
| X-Files Fans Congregate in Pasadena               |   9     |
| Spooky reports on the X-Files convention.         |         |
+---------------------------------------------------+---------+
| An Introduction To Number Bases                   |         |
| This is essential knowledge for any programmer    |   11    |
| or hacker.                                        |         |
+---------------------------------------------------+---------+
| Linux!                                            |   12    |
| Light Ray explores Linux, a 32-bit free UNIX      |         |
| for 80x86 and other platforms.                    |         |
+---------------------------------------------------+---------+
| The UNIX Column                                   |   14    |
| This month is an introduction to UNIX use.        |         |
+---------------------------------------------------+---------+
| Comdex: A Cultural Experience                     |         |
| Comdex is the world's largest computer trade      |   15    |
| show. Light Ray takes you there.                  |         |
+---------------------------------------------------+---------+
| Spinning A Web Page                               |   16    |
| Have your own page on the World Wide Web!         |         |
+---------------------------------------------------+---------+
| A Beginner's Guide to the Computer Underground    |   18    |
| by Pazuzu                                         |         |
+---------------------------------------------------+---------+
| Net.News                                          |   20    |
+---------------------------------------------------+---------|
| The Story Of DnA Systems DnA Systems II, Inc.     |   21    |
+---------------------------------------------------+---------+
| Net.Humor                                         |   23    |
|                                                   |         |
+---------------------------------------------------+---------+

+--------------------------------------------+  +------------------------+
|  Send Us Mail!                             |  |US$4.00 per issue, may  |
|  Carrier Wave Magazine                     |  |currently only be mailed|
|  P.O. Box 835                              |  |to destinations within  |
|  Lake Forest, California  92630-0835       |  |the United States. Make |
|                                            |  |checks out to Tobin     |
|  Or send email to                          |  |Fricke and include the  |
|                                            |  |number of the last issue|
|  dr261@cleveland.freenet.edu               |  |that you have and your  |
|                                            |  |email address.          |
+--------------------------------------------+  +------------------------+
+------------------------------------------------------------------------+
| Amendment I.                                                           |
|                                                                        |
|        "Congress shall make no law respecting an establishment of      |
| religion, or prohibiting the free excersize thereof; or abridging      |
| the freedom of speech, or of the press, or the right of the people     |
| peaceably to assemble, and to petition the Government for a redress    |
| of grievances."                                                        |
+------------------------------------------------------------------------+




|   From the Editor
|
|   (Light Ray Speaks)


Greetings everyone, and welcome to our zine.  This magazine has
existed for a long, long time, in the back of my brain where I
keep track of things I'd like to do someday.  Bucket Man and I
both wanted a zine.  Not a zine but a Magazine.  Well, Bucket
Man disappeared from the online world and now I have finally
gotten around to getting something started.

The ball actually started rolling at Boy Scout Camp as I sat on
a cot in a canvas tent and told stories of the exotic world of
artificial life and clipper chips, tales from the Digital
Frontier.  The audience was captivated! Well, at least
interested enough to stay and listen.  Ages ranged from 12 years
old to 17, but they were interested, and that's what counts.
They wanted to know more.  So I revived the magazine idea.  I
wanted to create a "Beginner's Guide to Everything."  Now, I'm
not sure what I have created.   I have here collected a mix of
material of interest to the newbie, to the hacker, to the
general computer user, and to the non-computer person.  I hope
you enjoy what you see here.  In any case, send your
complements, flames, and whatnot to me at
dr261@cleveland.freenet.edu.  (Note: Freenet does mean that it's
free, but please note that I'm not in Cleveland.)  I'm really
not sure what The Carrier Wave is or what it will become, for
that largely depends on the feedback that I receive.   It has
been my experience that diversity often means being mediocre in
all areas while specialization is to excel in one area.
However, for now, our credo remains the same: "Anything that's
neat."

Light Ray's Opinions on the State Of The Underground

The "underground" is in a sort of identity crisis it seems.
There is a flood of new, self-proclaimed "hackers" created when
the generic Jr. High kid gets a modem, an America Online
subscription, and a sees The Net or Hackers or a similar movie.
These new "hackers" clash with the old breed of true hackers,
they pollute the digital atmosphere and give Hackers a bad name.
 Hopefully this is a fad that will pass, although for now it is
a reality and is rather annoying.  The day after Hackers came
out, someone called me asking for "Passwords."  Hmph.  Perhaps
"God" and "Secret" didn't work for him.  Several days ago, an
acquaintance (not to be confused with friend) of mine stopped me
as I crusaded through the campus wielding a video camera for
Television & Video Productions.   Secretively, he drew a small
Radio Shack minicassette recorder from his pocket, presenting it
as if I should be struck with awe and wonder.  Slyly, he pressed
play, and five pulses of 1100hz+1700hz enshrouded in static
burst from the puny speaker, and I was supposed to be impressed.
Hmph. Just about everyone has a red box these days, and 90% of
them do not know how it works nor built it themselves.  Ever
wonder why America Online is doing so well?

Don't be a Lamer

If you don't know what a newbie is, then you are one.  A newbie
is someone who is new to something, specifically, in this case,
computers, digital networks, hacking, etc.  For you, read
onward. Read Pazuzu's beginner's introduction to the computer
underground, the Def Con stories, the STUPH Hotel San Remo hack
story, the Red Box story, and everything else.  Although it's
slightly dry and boring, you MUST read my introduction to number
bases if you don't know what 0x01AB34F means.  Start out on the
right foot.  If you have any questions, do some research on the
topic.  If you still don't have the answer, ask!  The address
for TCW is on the cover!  Just remember, hacking is not
destructive or malicious.  Hacking is exploration and pursuit of
knowledge, going where no one has gone before.  Hacking is
"pushing the edge of the envelope."

+--------------------------------------------------------------+
|  Call Digital Decay  +1 (714) 871-2057                       |
+--------------------------------------------------------------+



                 D E F C O N    I I I

 Las Vegas, NV - August 4 to 6, 1995 - Tropicana Hilton


We partied, we hacked, we talked, we listened.  We explored the
hidden reaches of the hotel, displayed a "Hackers Rule"  banner
on 1000 TV's, operated a pirate radio station (KDNA 104.7), had
a scavenger hunt, made wacky slime, played Hacker Jeopardy; we
were at Def Con III, a hacker's conference put on by The Dark
Tangent.



The 1995 DefCon 3 Hotel San Remo Entertainment system Hack

Presented by StUpH!


"First, they cracked into the hotel television system,
reprogramming it to scroll message reading 'Hacker's Rule'
across screens in 1,000 rooms." -- The Associated Press

I (Serum), Nocturne, and Heckler of STUPH (Small Town
Underground Phreakers and Hackers) had been wardialing all of
the 739 #'s while staying at the Tropicana.  We had found
numerous UNIX systems, but had been unable to penetrate any of
them.  Then, one of the dial-ins gave this prompt:

        Lodgenet!login:

Of course, I tried 'lodgenet' as the login, and lo and behold it
worked... Great security, huh? :)

We found out that we were in the Hotel San Remo, which is a
couple hotels down from the Tropicana, really close by. We were
then confronted with a main menu of sorts, there were four
different places one could go:


        Front-Office Menu

        Administration Menu

        Systems Maintenance

        Installation Menu

Unfortunately, each one of these menus were also password
protected... but at the bottom of the screen a 1-800 number was
left for tech support I proceeded to call the number and was
greeted by a friendly female operator...

"Lodgenet Support, this is Nancy. (I don't remember the name,
but Nancy sounds good)"

"Hello Nancy, this is Bruce Jenkins of the Hotel San Remo, and
I'm having trouble with the lodgenet system here.  For some
reason the password isn't working, I got by the lodgenet part of
course, but for some reason it isn't letting me into the Front
Office Menu, is there something I'm doing wrong?"

"Hmmm...  did you try FOF?  Or are you using BOF instead?" <Not
only does she give me the front office password, but the one to
the other sections as well... :) >

"I  thought I typed in FOF, I dunno..."

"Well, let me give it a shot..." <I hear some keystrokes and a
modem in the background, dialing the number> "It looks like it's
working to me..."

"I musta just made a typo, sorry to bother you..."

"No problem, if you need any more assistance, just give us a
call..."

BINGO We proceeded to call it back up and got into the front
office menu and the administration menu, the other two were of
no real interest to us, especially after we started playing with
the movies... :)

All you had to do was know a room number.  I think we used 150,
and found out that some guy had censored his TV so that it only
showed G rated things, we just couldn't pass that up so we
ordered a nice movie to his room and took away all of his
restrictions...  'BreastMan 5' suddenly appeared on his screen
for the easily payable price of $7.95... :)

We then found an option to edit the scroll message, and we put
up an advertisement for our hacking group...  We wanted badly to
see what had popped up on their screens so we went over to the
Hotel San Remo and checked it out for ourselves...  Walking
through the casinos at night and being the only three minors in
that area we felt kinda sheepish... :) But, we found a TV screen
by the Sports area (I'm not sure how to describe this area) and
we waited for the scrolly to appear, but to our dismay it never
did.  So, we went back to the Tropicana disappointed, but not
disheartened...  We then found an option to 'Edit Information
Channel', and that sounded good to us...  But, it was also
password protected... So, Nocturne called the 1-800 service this
time and just asked for the password to the Information Channel
cuz we didn't want to waste time trying to brute force it when
the helpful people at lodgenet just give away their passwords...
 Simply enough, the password was: 'edit' :)  So, we got into the
information channel and found we had complete control over what
was aired on that channel...  So we made a big advertisement for
StUpH and for DefCon 3 at the Tropicana... Satisfied, Heckler
and I went back to the Hotel San Remo one last time, and I
looked like a fool changing the TV to the info channel,
especially when a security guard walked right in front of us...
We waited and, BINGO! up popped a glorious message:


        Meet Uber  haqerz!
        See Serum, Heckler and
        Nocturne of STUPH!
        DefCon 3 at Tropicana!
        Ph3aR StUpH!

Heckler snapped two photos, waited some, then when it popped up
again we got two more... There you have it...  the 1995 DefCon 3
Hotel San Remo Entertainment system hack presented by StUpH!

Heckler (heckler@iastate.edu) is 18 and is a Freshman in college
this year.  He is currently unemployed in hopes of keep his
grades up.  He specializes in coding small programs for the PC
and coming up with lame ideas that always get shot down by
Serum.  (Thanks grease!) He has been hacking since the age of 11
when his parents bought him his neat-o C64 with a 300 baud
modem.  He is known for being very facetious and having no
morals.  He also likes to listen to heavy metal music and other
funky stuff like KMFDM, Hole, Nirvana, Pearl Jam, Nine Inch
Nails and White Zombie.  Right now he is working with Serum and
Nocturne on a program called MARCUS for IBM Compatibles. This
program uses a special scripting language to simulate any
text-based remote dialup and is capable of intercepting the
logins and passwords of the people who use that dialup. Serum
(bmeader@nyx10.cs.du.edu) is an 18 year old stud/Freshman in
college this year.  Currently, Serum is in transition from his
job at a local theatre to perhaps a job at a local Software Etc.
depending on the flexibility of the schedule.  He specializes in
the so called 'Field Activities' of hacking and phreaking and
has an uncanny knack of guessing passwords.  The motivator of
StUpH, he is always pushing Heckler and Nocturne to get them to
do very crazy and suicidal jobs.  His specialties include:
Social Engineering, organizing ideas for things for the group to
do, beige'topping', and helping develop MARCUS by creating
'BoxTrakker' a phone box tracking program.  He began to look for
people to hack and phreak with about three years ago, and was
fortunate enough to come across Heckler, who had already been on
the warez scene for a while, and Nocturne, an impressionable
classmate who learned quickly about the ways of Serum and
Heckler and has been an important member ever since.  He has
been hacking for about 3 years, but has been using computers
since the 2nd grade when he received his first Vic-20!   His
musical interests range from R.E.M to Nirvana, while his other
true love is the sport of basketball, where he will be competing
this year at the position of point guard. Nocturne, aka Cal
Ripkin, (nocturne@iastate.edu) is an 18 year old freshman in
college.  He began his road to complete corruption when he met
Serum in high school and was introduced to the world of warez
BBS's.  His interest in hacking bloomed almost immediately,
quickly consuming any thread of any social life he may have once
had.  Soon, he abandoned his human life for a life on the
Internet.  Now in college, he is trying to come out of the black
hole and become a respectable human being, but the outlook is
bleak.



Variation on a DefCon

By Bucket Man

My own personal DefCon story began two years ago. I had been
invited to DefCon I by a girl I met at the Continuation High
School I had ended up at through circumstances we won't go into.
A few days after the convention, she mentioned that we wouldn't
be going after all. When DefCon II came around I made
reservations at the Sahara and introduced some friends of mine
to hack/phreak in a big hurry so that I would have someone to
share the bill with. On our way out the door, our designated
driver's mother decided to commandeer the car, and as none of us
were 25, we were unable to rent one. Fortunately we only had to
pay for one of the two nights reserved. Then, along comes DefCon
III. I never thought I would get there, but owing many thanks to
my fellow party members, Light Ray and Squibb, as well as a wack
on the side of the head to the low life who canceled on us the
day before... I not only made it to Vegas, I even lived through
the experience.

Day One was mostly spent exploring the hotel and sharing
drive-up horror stories. We did manage to attach "Fred," our
laptop, to an outside line in the convention room. (An amusing
fact, since apparently Dark Tangent had requested that the hotel
disconnect the phones for that very reason.) We tore off a wall
plate and explored through the roofing above the hallway leading
to the convention room. Jarik talked the hotel staff into
bringing us water. It was shortly after this that we swore that
we would go the whole weekend without once paying for food,
alcohol, or women. We were partially successful: We paid for
food twice, I supplied free drinks, and didn't get any women.
After the first meal, however, I did discover the fastest way to
clear a path through a crowd. Wear a black trenchcoat in 100+
degree weather, and have someone behind you yell, "Look out!
He's got a gun!"

The midnight speech fell short of my expectations. Speaker: The
author of the Little Black Book of Computer Viruses. Topic:
Publishing. Summary: "Uh...hi. Write books. Yes. You must write
books. No, really! Write books! It is morally imperative that
you all write books. I wrote one and no one would publish it,
and, not considering the possibility that it might have been
because it wasn't any good assumed it was a vast anti-hacker
conspiracy and published it on my own and sold nearly 300
copies. So, you must write books. Write books and I will publish
them for you. I'll give you 1/10th of once percent of the
profit, so write books..." Sorry, but I had a hard time
believing that this guy's real motivation was to preserve our
moral integrity and establish cultural connections to the past
for future generations. Light Ray walked out in the middle, came
back an hour later and the guy was still droning on. Oh well, I
suppose I'll recover from the emotional scarring, but after that
didn't bother with any of the other speeches, and probably
missed some good things. Rumor has it that my raffle number was
the first number called for the 4x CD drive, on Sunday.

Around two AM, I figured that the best way to get free drinks
would be to walk behind the bar and grab bottles. It worked. An
hour later I talked an extremely attractive girl into letting
myself and two of my companions into joining her (and her
boyfriend) back in her hotel room. Now...according to Jarik I
massaged her feet for three hours, but I don't believe him. All
I know is that it was dark when I started, and it wasn't when I
stopped. Then I passed out under a table and the three of them
played strip poker. (Damn you, Jarik! You could have kicked me
harder!)

It was Saturday night that I was awakened from a daze by a call
from Arclight asking if it would be ok to use our room as
broadcast station for a pirate radio station. "Sure," I said, I
mean, it wasn't like I had anything better to do. So, shortly
thereafter, the KDNA crew shows up and starts setting up
equipment. Meanwhile, I put on an old Halloween costume of Ali
Abbabwa from Disney's Aladdin and started wandering around the
hotel. I wanted to go to the Aladdin hotel and pretend to be
staff, but couldn't find anyone with a camera. Hey, it worked at
Disneyland. Light Ray and I ended up running around the hotel
with, "Crazy GTE man," a guy who had stolen a GTE flag and was
using it as a cape telling everybody to tune in to Pirate Radio
104.7 KDNA. Light Ray changed into a ninja uniform and I donned
my infamous Chun Li outfit. (Yes...Chun Li from Street Fighter
II) I was surprised by how little I got harassed about it. Most
people just chuckled and waited to see what else we would do.
Security freaked out about the ninja uniform though, none of the
elevators would work for us and we had to use the stairs for a
good portion of the night. (Evidently a good thing, because
security was looking for the broadcast point and figured we were
a good place to start looking. If nothing else, I figure not
many people can claim they've wandered through a Vegas casino
dressed up as a fictional oriental girl. Hehehe...wonder what
I'll do next year...


Def Con Information

The Dark Tangent        dtangent@defcon.org
Def Con Mailing List    majordomo@fc.net
Jackal                  jackal@kaiwan.com
Def Con Homepage        http://www.defcon.org/
                        http://www.fc.net/defcon


The Dark Tangent organizes Def Con. Instead of sending mail to
DT, you might want to subscribe to dc-announce.  Jackal
organizes the Southern California caravan.  If you're in Souther
California and are interested in going, send Jackal mail.  Tell
him if you need a ride or can provide rides.  To subscribe to a
mailing list, send mail to majordomo@fc.net with the text
"subscribe " followed by the name of the mailing list you wish
to subscribe to.  Mailing lists include:

dc-announce     official announcments
dc-stuff        general chat
dc-speak        Def Con IV Speakers
dc-plan Def Con IV Planning


HAQS


Hacking Postal Barcodes - Ever wondered what information was
hidden away in the mysterious bar-codes you find on the bottom
of envelopes?  The bar-code is your full eleven-digit ZIP-code
(Did you know you even had an eleven digit ZIP code?).  It is
composed of vertical bars which are either full-height (about
0.5 cm tall) or half-height.  The system is somewhat of a binary
derivative, as each bar has two possible states, tall or short,
or one and zero.   The first bar is always tall (1) and is known
as the "frame bar" because it lets the scanner determine the
beginning of the bar code.  After that, each five bars
corresponds to one digit of your ZIP code. To decode it, start
at zero.  If the first bar is tall, then add seven.  If the
second is tall, add 4.  The third, 2, the fourth add 1, and the
fifth bar is zero.  (I'm not sure exactly why the fifth bar is
necessary.)  Basically, it's binary, but the place values are 7,
4, 2, 1, 0 instead of 16, 8, 4, 2, 1.  Thank you to Rat         from
DnA (ratphun@aol.com) for the information.


Electronic Shoplifting Counter- measures - You probably
encounter these devices daily. They are the panels you walk
between when exiting a retail store or library, etc.  If you
walk  through carrying an item not paid for, an alarm goes off.
Apparently, in the stickers placed on the items is a tiny r-c
circuit (resister/capacitor) tuned to resonate at a specific
frequency.  The "panels" emit radio signals at that frequency.
When the r-c circuit is exposed to signals of the specified
frequency, it reradiates a signal at the same frequency that is
not in phase with the signal emitted by the panels. If an
out-of-phase signal is detected, an alarm goes off.  How do they
desensitize the system once you pay for an item?  When placed in
a somewhat strong magnetic field, a small current is induced
into the r-c circuit.  Since the circuit is so small, it is
burnt by that current, rendering it unable to reradiate signals
at the same frequency.


Wacky Weird Slime Stuph- We made this at DefCon 1995..   I think
it was Q-Master's idea.  It's very difficult to describe, you'll
just have to make it yourself.  Rumor has it that it is
officially called "Ooblix" or something like that.  Anyways, get
a large vat and dump equal amounts (by volume) of lukewarm water
and powdered cornstarch into it.  Stir.  It should turn into a
soupy gray glop.  Okay, put your hands in and pull them out
slowly.  See, it's just a liquid.  Okay, put your hands in and
pull them out quickly.  The liquid glob will coagulate into a
solid and you will lift the container up.  Then, it will return
to its original state of liquidness.  It's wierd.


MUDs As a Possible Security Risk Part I

By Pazuzu


August, 1995 (C) Copyright 1995 Sixth Column with explicit
reservation of all rights (UCC 1-207).  Written by Pazuzu for
The Carrier Wave, used with permission.


Preface

This article will not directly tell you step-by-step how to hack
an Internet machine through the MUD server. It will, however,
give you a good base of knowledge on how MUDs work and what
security holes have been discovered and exploited in the past.
You are then left to your own skill and devices to do what you
will. Newer versions of the mudlibs will probably patch up some
or all of these security holes, but I'm sure new ones will be
created and/or discovered. Hacking should always be a learning,
exploring, and discovering experience... If you find anything,
email me.

Part I: The Basics

One of the most popular things to do on the Internet these days
is to play MUDs. For those of you unfamiliar with them, MUDs are
"Multi-User Dungeons". Most of them are, of course, role-playing
games. A bunch of people (sometimes up to 50 or more) can be on
at once interacting with each other, the virtual environment,
and non-player characters or monsters created by the MUD's
creators. You connect to a MUD either with the standard telnet
utility or via a special program called a "MUD Client". MUD
clients will usually give you cool features like split screens
and colors, whereas telnet is very crude and simple.

Some players on every MUD (and in a lot of cases, most of the
players) will have access to code objects, which can be rooms,
areas, monsters, weapons, armor, anything in the game. This type
of access is referred to as "creator" access. Objects, on most
MUDs, are coded in a programming language called LPC, which is
very much like C, but with extensions designed to make it easy
to code MUD objects.

Now all these things sound well and good and fun, but under the
hood, MUDs can be a security risk waiting to be exploited.
Despite having great fun and wreaking havoc with the MUD itself,
a clever hacker could fairly easily gain access to an operating
system prompt running with the UID of the MUD daemon which, in a
lot of cases, would be ROOT! You see, MUDs are run by a "driver"
program which is simply a program written in C (usually) that
runs as a daemon task on a UNIX machine. The driver then
interprets the LPC code written by the MUDs creators. This
daemon is usually started with a UID of ROOT (since they're
usually run from /etc/rc.d/rc.local).

On most MUDs, there is also another layer between the driver and
the creator-written LPC code. This layer is the "mudlib".
Mudlibs (there are many of them) are simply libraries of LPC
code, usually written by a large team of LPC programmers, which
define the basic functionality of the MUD, such as user logins,
how to display information, how the player's and monster's
bodies work, etc. The creators then write code which calls the
mudlib and inherits (LPC is a totally object-oriented language,
with full inheritance, etc.) certain properties, and defines
objects such as rooms, monsters, etc.

Now, before we move on, let's make sure you've got the basic
terminology down. There are many things involved with a MUD (who
knew games could be such a pain in the ass?) and in order to
seize control of one, you must understand everything. So, here's
a quick MUD dictionary.

 creator: anyone on a MUD who has access to code objects

driver: the executable file, run as a system daemon, that reads
and interprets the game definition (LPC code)



LPC     stands for Lars Pensj C ... The programming language you
write in to create MUD objects

mudlib  the library of LPC code whichs defines the basic MUD
functionality

object  anything in the game -- players, monsters, rooms, the
weather daemon, weapons, etc


 If you get creator access on a MUD (usually this can be done by
gaining a certain level of experience, or completing some quest
in the game), there is a lot you can do to fuck with the MUD
itself. While this isn't real useful from a hacking standpoint
(you won't get into the O/S this way...), it *can* be a lot of
fun, and can serve as a way to learn LPC coding as well as the
internals of whatever mudlib the MUD is using.

The mudlib I'm familiar with is the TMI-2 mudlib, one of the
most popular ones around. So the stuff I'm going to mention may
not apply to the mud you're on, since they might not by using
TMI-2. The mudlib is usually mentioned somewhere in the login
text.

Everything in the MUD is an object that's defined in LPC code in
a file somewhere in the MUD's filesystem. MUDs have a filesystem
all their own, and it's made to look exactly like a normal UNIX
tree structure. It all starts from a root directory, which is
referred to as '/', just like in UNIX. This *is not* the host
system's real root directory, it's merely the *MUD's* root
directory. On most UNIXes, the actual physical directory will be
/usr/local/mud/lib/TMI2-1.2/ or something similar. Underneath
this root are all the MUD's directories which store various
configuration files and LPC code files, some of which are part
of the mudlib, and others which are creator-defined. Some
important directories are:

/adm - admin-only stuff like code for system daemons, etc...
/adm/daemon - system daemons /std - standard definitions (mostly
these will get inherited somewhere else) /cmd - LPC code for all
the user commands (some are in sub-dirs under this) /obj - where
most MUDs keep their LPC code for monsters, weapons, armor,
magic items, etc. /u/<1st-letter>/<name> - creator-access user's
home directories... home  directory for Pazuzu would be
/u/p/pazuzu, vandal  would be /u/v/vandal

In the MUD itself, you can use standard UNIX directory
management commands to manage files and directories (again, if
you have creator access). Here's a quick review:

cd      change directory, just like in DOS or UNIX

mkdir   make directory

rmdir   remove directory

pwd     show what directory you are in

rm      remove file





Interestingly, they mimicked UNiX's filesystem so completely,
you can refer to user's home directories on the MUD exactly how
you would under UNIX: ~<name>/ (pazuzu's home dir would be
~pazuzu/).

MUDs have mail and finger just like UNIX also. The finger
support is so complete, it allows for the standard .plan and/or
.projects files in your MUD home dir, just like under UNIX.

A lot of MUDs also have newsgroup support also.

The reason I mention all this is that they have tried to put the
full functionality of having a UNIX shell account under the MUD.
However, since you're really *NOT* using UNIX, just a UNIX
program (which is running as a daemon with UID = ROOT!),
security is dubious at best. For example, if they don't do path
checking (and sometimes they don't...), you could request (if
you were in the MUD's root dir) to edit, let's say,
../../../../../etc/passwd, and assuming the physical directory
/usr/local/mud/lib/TMI2-1.2/, get the system's password file.
Now keep in mind that this is all experimental... I'm just going
into what I have done in the past and letting you go from there
with (hopefully) a good base knowledge on how these buggers work.

One thing that can be a lot of fun is making sure that when you
kill someone, they stay dead for a while. Normally, on a MUD,
when you get "killed", what happens internally is that your
"player" body gets switched to a "ghost" body and gets moved
into the cemetery. There, you can usually type a "pray" or
similar command and get brought back from the dead. However, if
you kill someone and then IMMEDIATELY type trace -dv /std/ghost,
the ghost object will get destroyed, and the player's connection
will get dropped. "trace" is a standard creator access command
that lets you trace instances of objects, -dv means (d)estroy
and (v)iew, and /std/ghost is name name of the LPC file which
defines the standard ghost object. It would be an LPC file
called ghost.c in the /std directory. You can destroy any
object(s) with the trace -dv command. For example, to get rid of
everyone in the game's sword, type trace -dv /obj/sword. More
malicious things to do include killing the MUD's login daemon
(if you have the access: trace -dv /adm/daemon/login-- won't
work in most cases, unless you have high access or the MUD's
admin is a moron), killing the MUD's FTP server, if it has one
(trace -dv /adm/daemon/ftpd), or killing various other system
daemons. These include /adm/daemon/httpd, /adm/daemon/weatherd,
etc.

If you don't have the access you need, there are ways to get it
-- sometimes. In order to understand how this next trick works,
you need to understand how LPC MUD drivers look at objects.
Everything in the game is an object: weapons, armor, players,
ghosts, rooms, EVERYTHING. There is no difference between
objects -- only their properties vary. In order to carry a
weapon, the weapon object's location property is set to the
object ID of the player. The weapon is now "in" the player. It's
the same with rooms: the player object's location property is
set to the room's object ID. The player is now "in" the room. A
special case of this is when one body object is moved into
another body object. When this happens, the "moved" body
"becomes" the "moved to" body. The object that was moved takes
on all the properties (access level is a property, hint hint) of
the object it moved into. Now, keep in mind that most MUD
admins' characters are left in the game at all times, sitting
idle. What would happen if a player moved into one of the
admins' bodies? Hmmm... That player would now BE the admin,
effectively. He could then do practically anything he wanted to,
including destroy the entire MUD. How is this done? Well, try
typing (on a TMI-2 MUD) call me;move;/d/TMI/cemetery. You're now
in the cemetery. Keeping in mind that objects are objects, try
call me;move;/std/player#nnnn, where nnnn depends on the output
of a trace /std/player... Next to everyone's player object,
there'll be an instance number. So if one of the admins was
instance #1493, call me;move;/std/player#1493 would *probably*
move you into his body, allowing you free reign of destruction
over the MUD. Keep in mind that all this stuff will work or not
work based on how tight the MUD's security is. It will work in a
lot of cases, though.

Another way to wreak absolute havoc on some MUDs is to destroy
the VOID object. Objects in LPC *must* have a location, so when
something is really nowhere, it's in the VOID object. The best
way to see what will happen is to find a room that a whole bunch
of players are in. Then go to a different room and run a trace
/std/player to see what the filename of that room is. Then run a
trace -dv <file>, replacing <file> with the path/file name of
the room. All those players will now be in the VOID. So,
immediately type tracedv /std/void (or /d/TMI/void - run a trace
/std/player real quick to see which one your MUD is using), and
all the players will no longed be ANYWHERE, which will likely
cause the MUD to panic and possibly lock up. Note that this is
really a bug in the TMI-2 (and most other) mudlib, and it may
get fixed someday.

As a side note, there are some commands you should immediately
run once you get on a MUD. The first is call me;set;immortal;1 -
this will make you immortal (no one can kill you through normal
means). You should also run a call me;set;max_hp;666 (or some
other high number), since even though you're immortal, you can
still have your HP go to 0, which *does* fuck up the combat
routines, so you should make your HP very high.

Now all of this may seem very lame and silly, but it's all a
preliminary to the real fun... In order to do what you need or
want to do, you must understand how LPC and MUDs in general work.

I am including a copy of George Reese's (Borg's) basic &
intermediate LPC tutorials so that you may learn a little more
about LPC. Please read those before continuing this article,
else you'll get lost.

 On some of the more advanced MUDs (and this is becoming the
norm), there are FTP and HTTP servers running "in the mud". What
that means is that they're being run by the MUD, but of course,
they're listening on a different TCP/IP port. When you telnet to
a MUD, you specify the address (like rodent.mud.com), and also
the PORT that the MUD is running on... For example: telnet
rodent.mud.com 1000 ... Usually, if there's an FTP or HTTP
server running on the MUD, it'll be one port away from the MUD's
telnet port. So, if the MUD's telnet port is 1000, the FTP
server could be on 999 or 1001, or something totally different.
Same for the HTTP server. There will usually be a message about
the FTP/HTTP servers somewhere on the MUD itself, since they
want you to think they're really |<-|<(/)(/)1!@

These servers are actually written in LPC! Mind you, the
advanced LPC techniques used to create them are way beyond the
scope of this article (or any other that I've seen). I've read
through the source for both servers (at least under the TMI-2
mudlib anyhow), and believe me, the code is rather convoluted
and full of possible security holes.

In my next article, we'll discuss the TMI-2 FTP & HTTP servers.


THE RED BOX

The Red Box is a tool used by phreaks (Phone Hackers) to make
fraudulent free phone calls from payphones.  It looks like the
days of the Red Box are limited, and soon it may take it's place
with the Blue Box.  Using a red box is not true phreaking at
all, however, it's a good place to start.

Theory



When you put a quarter (or any other accepted coin) into a
payphone (see sidebar), it drops into a holding area (the
"hopper") in the center of the phone and the phone tells the
phone company that money was inserted and how much.  It does
this by sending a series of tones, one pulse of 1100+1700 Hertz
for every five cents.  If you make a call successfully, your
money drops down to the change holding box.  If you don't, it
drops down to the coin return.  This is why payphones cannot
give change.  The red box generates the 1100+1700 Hertz signal,
which is played into the mouthpiece of the phone.  The phone
company thinks that you put money in the phone, so you can make
calls.  Note the t you cannot get any money out of the phone
using a red box for two reasons. The first is that the payphone
doesn't listen for the red box tones, the phone company does.
The second is that payphones can only return the exact change
that you put in.  (i.e., the same quarter)   The phone company
can tell the payphone to release the coins in the holding
chamber to either the coin box or the coin return using green
box tones.  However, the green box tones must be sent from the
phone company to the phone, so it is fairly useless to the
phreaker.

Construction

There are two dominant methods of constructing a red box.  The
first is to  build something that will generate the tones, and
the second is to record the tones onto a recording device.

Software is readily available for DOS and other platforms to
create the necessary tones through your sound card.  These
include BlueBeep and BOX.EXE which was distributed with Phrack.
You may record these tones on a quality tape recorder, but that
is fairly clunky.  A better method is to get an $8.00 Hallmark
recordable greeting card at a Hallmark card.  Take the card
apart (be very careful, the tiny wires break easily) and
repackage the electronics.  Be creative! Red boxes have been
created in dolls, pager cases, gum packages, etc. Replace the
cheesy plastic button with a normally open push-button switch
(from Radio Shack or wherever) and record the tones on the card.
 You may get better results if you directly couple your sound
source to the microphone wires (after removing the microphone.)
It may also be necessary to install a small resister in series
with the speaker to achieve proper volume.

Another way to create a red box is by modifying a Radio Shack
memory tone dialer.  This method usually works the best, but it
is probably the most expensive.  Take a Radio Shack Memory Tone
Dialer and open it up.  Find the crystal and replace it with a
6.5536 megahertz crystal.  The existing crystal is the biggest
thing you'll see, and it should look similar to the 6.5536
replacement crystal, which you can mail order from any
electronics component vendor.  Program one of the memory keys to
be five asterisks (*'s).  That memory key will then be one
quarter.  You may want to install a switch so that you can still
use the tone dialer as a tone dialer in addition to a red box.
Mercury switches are neat: right side up it's a tone dialer,
upside down, it's a red box.

Use

Since this article is for educational purposes only, don't
actually make or use a red box.  However, here's how phreakers
use the red box.

Basically, just play the tones instead of inserting money.  It's
good practice (to avoid being caught) to insert some real money
before (i.e., a nickel, payphones don't accept pennies) playing
any tones.  Put a random delay between virtual coins.  Remember,
one pulse if five cents.

Note that you cannot make local calls directly using a red box.
To make a local call, dial the operator and ask him/her to dial
a number for you.  Give them the number, tell them you want to
pay by coin, play the tones when it asks for money.

That's just about all there is to red boxing.  I hope this
article has been interesting and educational.  If you're
interested in more fun things you can do with payphones,
download ABCPP.ZIP from the Digital Forest.  It's quite
interesting.  Remember, making, using, and owning telephone
fraud devices and such equipment is very illegal, so don't do
anything described in this article.  We're not responsible if
you do.




| Electronic Mail:
| The Real Killer App,
| Its Future And Impact
| By Light Ray

While Netscape Communications proclaims that Netscape/Mozilla is
the "Killer App" and others cite other www browsers as being the
"Killer App," many of them are losing touch with what is
actually useful.  Sure, the world wide web is fun, but it's
fairly useless right now.  More people use E-Mail than use any
other Internet function.  Today, our AFS exchange student used
E-Mail to send mail to his family back in the Slovak Republic,
instead of making an expensive $1.50 a minute telephone call.
On the radio, the DJ solicited Internet email for a contest to
win something.  With the world wide web, about all one can do at
this point is obtain information on a particular topic.  With
electronic mail, one can interactively converse with someone.
It's as fast as a phone call and much cheaper, and it doesn't
matter if the intended recipient is at home.

Unfortunately, there isn't really a 411 for electronic mail, so
it's difficult to find someone's address.  The easiest  way to
get someone's e-mail address is to call them on the telephone
and ask.

An emerging technology is voice technology over the Internet.
This allows you to talk to someone over the Internet, no matter
where they are physically located. (No long distance phone
bills!)  Unfortunately, this technology is still being
developed.  It's available now, but there are few standards.
Unlike electronic mail, you must be using the same software as
the person that you are talking to, on the same type of
computer, and often the conversation must be prearranged.
However, as standards emerge, voice over the Internet may become
as standard as electronic mail.

The next logical step in the evolution of digital communication
is video conferencing.  Again, this is here today to some
extent.  You can purchase a real video-phone that works over
normal phone lines at your local AT&T store.  However, almost no
one has these phones for three reasons: (1) they see no reason
to get one (2) they are very expensive and (3) no one else has
one.  A telephone's usefulness is dependent on how many people
have telephones.  If only one person has a telephone, it's
completely useless.   Video over the Internet requires several
things that aren't yet common.  While most computers now include
sound recording and playback hardware, few personal computers
include video recording and playback equipment.  In addition, a
video camera is much more expensive than a microphone.  Even if
you have all of the necessary hardware, you still need a high
speed Internet connection, which are fairly expensive right now.
 With ISDN becoming more popular, this may change.  An ISDN is
basically a digital phone line, which is very well suited to
high speed digital communications.  ISDN is available now in
many areas; you can get an ISDN line for $30 a month from
Pacific Bell. Also needed to make video-over-the-net work are
software, standards, and data compression technology.  With
companies such as US Robotics manufacturing ISDN equipment for
low prices, ISDN is bound to become much more popular in the
near future, bringing an era of mail, speech, and video over the
Internet.

What implications does this have?  Many, believe it or not.
First, Internet email is cheap (usually free or as much as $10
per month).  This should scare the phone company and the United
States Postal Service.  Email is the telegraph and the USPS is
the pony express.  Of course, you can't send an object through
email (yet), but the majority of correspondence is information
readily sent electronically. An organization must diversify and
evolve or perish.  Unlike most government




X-Files Fans Turn Out For The Convention in Pasadena

By Spooky

On a terribly hot Saturday afternoon, many thousands of people
gathered, crammed in what no longer seems the suitable space of
the Pasadena Convention Center, in Southern California.   But
throughout the day, not a word of complaint is heard. The
majority of the fans who gathered here traveled some distance to
bare witness to the "Second Official X-Files Convention",
playfully nicknamed "The Big-One" by Creation. Whom organize all
The X-Files Conventions. And whom organized the first event in
San Diego, which i attended about a month and a half before.   I
walk in and scan the large crowds of people, spending hundreds
of dollars buying all of the merchandise they can get their
hands on. By the end of the day all of it is all sold out.
Everything from X-Files T-shirts, to TV guides, costing anywhere
from $60-$5. And some other areas, where you can check out
The-Files home page on the world wide web, to one where you can
walk through a small museum of show props, from clothes worn by
David Duchovney (Agent Mulder) (who had roles in Twin Peaks, as
a Transvestite Government Agent, Beethoven, as a greedy
businessmen, Don't Tell Mom the Babysitters Dead, as an asshole
boyfriend, played a leading role in Kalifornia, and  has a head
role in Showtimes Red Shoe Diaries and has been in a few
commercials for AT&T) or Gillian Anderson (Agent Scully),  to
the sign used in one of the first seasons episodes with the
words  "Welcome Space Brothers" written on them in a
psyhicadellic 60's fashion.      I walked through isles of seats
trying to find a suitable place to  watch the guests on stage,
presenting slides of X-Files episodes,  Looking at the people
anxiously awaiting the monterage of highly adored actors, (Mitch
Pileggi -Assistant Director Skinner,  Steven Williams -Mr. X,
Dough Hutchinson -Tooms, Erica & Sabrina Kreivens  -Eve 9 & Eve
10) whom, mostly were unknowns before being casted into the
growing fledgling, science fiction, "cult", drama cozily placed
in a wonderful 9:00Pm, Friday slot on the Fox television
network. Providing an adequate, environment, and structure to
allow you to really get into the show.         Going into its
third season, The X-Files has passed the test, which most TV
series never make it through. The creator of the X-Files, Chris
Carter, former surfer magazine journalist, who spoke at the
convention, has planned its three-part season premiere,  which
will continue on September 22, -its usual time, and day.   A
little later, i noticed the now straggly, long haired, unshaven,
 Doug Hutchinson (Tooms) wandering through the crowds, wearing
the black leather jacket, he wore at the X-Files convention in
San Diego.  He jokingly calls this his "rocker" phase. I
approached him, and smiling,  ask for his autograph. I
immediately knew that it was really him, as soon  as he, in his
friendly manner, said, "Sure...how did you recognize me?"  with
a grin. I stood with him shortly as politely took his time and
had  a small conversation as doodled  "LIVERS!" and "Tooms" on
my program. I  thanked him, saying "Bring Back Tooms!" -a phrase
that was adopted by some X-Files fans at the first convention.
 I listened to some of the actors, speak, and answer questions
from the audience, about the show, and their characters. Mitch
Pileggi- who plays Skinner, was asked by some women in the
audience, if they could kiss his forehead, he respectfully
agreed, and walked down off stage. He remarkably, unlike his
character Walter Skinner -a very angry, unlikable, asshole of a
man, is polite, and easy to like.    Soon the time arrives,
after the charity auction, which things such as  Signed scripts
were sold for as much as $760. Chris Carter comes out wearing
casual dress, flashes from cameras and the talk of reporters
start to thrive in the auditorium.   Everyone rushes up to the
podium to ask him questions. By the time he's finished with them
all, the lines have already started to form at the table where
he's scheduled to sign autographs. Near the end of the close, he
begins, to re-describe the season finale, in which  the lead
actor, Mulder, is caught in a situation where he's trapped in a
train car, sunk 20 feet in the ground filled with strange bodies
stacked to the roof at one corner. An explosive goes off inside
the car, the credits  begin to go across the screen.  Carter
laughing, speaks into the microphone, "I have no idea how the
bring Mulder back". The audience laughs as he walks off stage.


An Introduction To
NUMBER BASES
By Light Ray


[This artical makes use of formulas, diagrams,
superscrips, and subscripts that may or may not
be present in the ASCII version.]

Notes

This is taken from the "lab notes" from Explorer Post 340, the
oldest  Boy Scout Explorer Post in the world, as far as I know.
Explorer Post  340 is wonderful. We meet at the Western Digital
Building in the  El Toro "Y", between the I-5 and 405 ("San
Diego") freeways every  Wednesday night from about 7:15pm to
around 9:30pm. This is the first file in a series of
articles/files. I know that most people know this already, but
for those that don't, here it is.

Introduction

When we write a number, we have ten symbols to work with. They
are 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. Since we have ten symbols,
we say that this is Base 10. However, there are times when it is
awkward or impossible to use base ten. For these situations, we
use alternate number bases. For instance, binary has two
symbols, 0 and 1.



A knowledge of alternate number bases (namely binary,
hexadecimal,  and sometimes octal) is necessary for advanced
programming, digital  logic design, impressing your friends,
winning the lottery, and  having a successful and fulfilling
life.. Well, almost all of  those.


In base X, there are X symbols. People currently use base ten
just  about everywhere, allegedly, this is because people have
ten fingers. That is,  most people, except for those of us who
take interest in machining  or pyrotechnics...


Bases other than the ever-present base-10 have more or fewer
symbols  making them more applicable for non-human applications,
those that  do not have ten fingers.

A Summary Of Base Ten

Base 10 (decimal) uses 10 symbols. These are 0, 1, 2, 3, 4, 5,
6, 7,  8, and 9. This is why it is called base 10.

When writing a number in a specific base, the base is written in
 subscript after the number. For instance, 1310 represents 13 in
Base 10.

To count in base 10, we start at 0 and add one until we get to
9. At  this point, it is necessary to create an additional
column to the left,  containing a one. Every time the first
column reaches 9, it is set to  zero and the column to the left
is incremented. When 99 is reached a  third column containing a
one is created and the two nines are set to  zero, etc.

 In base 10, every column is 10 times greater than the column to
the  right:


Thousands       Hundreds        Tens    Ones

103      102    101     100
1,000   100     10      1

The value of the number 1234 in base 10 is computed by
multiplying  each digit by the value of its place and taking the
sum of the  individual
products.

123410=(1*103)+(2*102)+(3*101)+(4* 100)
123410=(1*1000)+(2*100)+(3*10)+(4*1)
123410=1000 + 200 + 30 + 4
123410=123410

The range of positive values that can be represented by n digits
in  base x is 0 to (xn - 1). For example, the range of positive
values  that may be expressed by a ten digit number in base four
is 0 to  9999. x = 10    n = 4

range = 0 to (xn - 1)
range = 0 to (10^4 - 1)
range = 0 to (10000 - 1)
range = 0 to 9999

 A Summary Of Base Two

Base Two, otherwise known as Binary, uses TWO symbols. These two
 symbols are ZERO (0) and ONE (1). In binary, the symbols 2,3,4
etc. simply do not exist.

Binary is often used in digital electronics and logic because a
digital  signal has two states, on (1) and off (0). On is
usually five volts and  off is usually ground or zero volts.

To count in base two, use the same system as base ten. However,
you only  have two symbols.

Start at Zero.

To find the next number, increment the first (right-most) digit.
If this  digit is already a ONE, then change it to a ZERO and
increment the value  to the left.

Binary (Base 2)         Decimal (Base 10)

0000    0
0001    1
0010    2
0011    3
0100    4
0101    5
0110    6
0111    7
1000    8
1001    9
1010    10
1011    11
1100    12
1101    13
1110    14
1111    15



In base two, every column has two times greater value than the
column immediately to the right.

Eights  Fours   Twos    Ones

23      22      21      20

The value of the number 1101 in base 2 is computed by
multiplying   each digit by the value of its column and summing
the individual   products, just as in decimal. 11012 = 1310

The range of positive values that can be expressed by n digits
in   base two is zero through (2^n - 1). For example, the
numbers 0   through (2^4 - 1) or 15 may be expressed in four
digits of binary.

A BIT is a single Binary digIT. A bit is either zero or one. A
NIBBLE is four bits. A BYTE is two nibbles or eight bits. A byte
has a value of zero to (28 - 1) or 255. A WORD is normally two
bytes. A word can express 0 to 65535. A LONG WORD is normally
two words.

An 80386 processor transfers digital data a word at a time. A
486 processor transfers data a long word at a time.

A Summary Of Base 16

Base 16 is known as hexadecimal. Hexadecimal uses sixteen
symbols,   which are: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D,
E, and F.

Keep in mind that:

        A16 = 1010
        B16 = 1110
        etc.

The place values in hexadecimal are:

4096's  256's   16's    Ones
163     162     161     160

Sample Conversion:

1A3F16 = (1 * 163) + (A * 162) + (3 * 161) + (F * 160)
1A3F16 = (1 * 4906) + (10 * 256) + (3 * 16) + (15 * 1)
1A3F16 = 4906 + 2560 + 48 + 15
1A3F16 = 671910

Converting from Decimal to Binary

The best way to illustrate how to convert a decimal number to
binary  (or any other base for that matter) is to show an
example.

Say that we want to convert 19710 to binary.

First, write out the place values for the target base. Start
with a  place value that is greater than the number you wish to
convert.

256     128     64      32      16      8       4       2       1
28      27      26      25      24      23      22      21      20

  The object is to come up with 197 by taking the sum of
selected place  values. Those place values that are selected
will be "1" and those that  aren't will be set to "0".

  For example, 197 is the sum of 128, 64, 4, and 1. We write 1's
under the 128, 64, 4, and 1 columns, and 0's under the  other
columns:

256     128     64      32      16      8       4       2       1
0       1       1       0       0       0       1       0       1

  The answer is 110001012.

There is an easier way, but I don't remember it right now. (=
You could, of course, use your scientific calculator.

Converting from Hexadecimal to   Binary and back

We could, of course, convert the Hexadecimal number to Decimal,
and then convert it to Binary. However, there is an amazing
short cut!  (This is actually why we use hexadecimal)

The range that may be expressed by one binary nibble is 0 to 15.
Incidentally, one Hexadecimal digit has the same range, 0 to 15.
Thus, each four digits in binary is equivalent to one digit in
hexadecimal, and vice-versa.

Binary  Decimal         Hexidecimal

0000    0       0
0001    1       1
0010    2       2
0011    3       3
0101    5       5
0110    6       6
0111    7       7
1000    8       8
1001    9       9
1010    10      A
1011    11      B
1100    12      C
1101    13      D
1110    14      E
1111    15      F

To convert 01001001011101102 to hexadecimal, first split it   up
into nibbles:

        0100 1001 0111 0110

Then, convert each nibble to hex. Use the chart if necessary.

Binary  0100    1001    0111    0110
Hex     4       9       7       6

   Thus, 01001001011101102 = 497616

Since the base 16 version is so much shorter, we work with   hex
very often when programming and using digital logic.  Note that
in programming, hexadecimal numbers are often prefixed with
"0x0" to denote hex.  This is the C language method of doing it.
 Other times, you'll see hex numbers prefixed with a dollar sign
or appended with a lower case "h."

12AB16 = 0x012AB = $012AB = 12ABh

Now, lacking a better ending for this lesson, I will leave it at
that.


LINUX

Imagine: Your puny '386 turned into a powerful UNIX workstation,
for free.  It can be done with Linux...

What Is Linux?

Linux is a freely-distributable implementation of UNIX for
machines with 80386 or higher processors. Features include
X-Windows, TCP/IP, and everything else you would expect to find
in a 32-bit multi-user, multi-tasking, multi-threaded operating
system. Best of all, Linux is FREE. You can get Linux through a
variety of methods. The easiest way is to buy a CD with Linux on
it. You can also download Linux from many BBS's or FTP it over
the Internet. You may FTP Linux from 11.mit.edu or
sunsite.unc.edu.

My First Attempt

One night, while browsing files on a local BBS, I discovered
that "SoftLanding Systems" distribution of Linux was available
for download. Thus,  I began a 16mb batch download and went to
bed.

I woke up the next day to play with my new acquisition.
Instructions? Hm. The installation instructions were sketchy at
best. I figured out how to create a bootdisk and a root disk,
then I needed to repartition my hard disk and create a Minix
filesystem on it. This took several hours and I never did get
Linux installed correctly. I gave up, my hard disk in shambles,
and I had better things to do at the time.

A New Look

Last week, at the computer swap meet, something caught my eye.
"4-CD Set LINUX Developers Resource," it proclaimed, "QuickStart
Guide Inside" noted underneath. I decided to give Linux another
shot, so I painfully parted with a hard earned twenty dollar
bill and it was mine.

When I got home, I put in Disc One and began reading the cute
little "QUICKSTART version 2.0" booklet.

The first step in the Linux installation is to create a Boot
Floppy and a Root Floppy. To do this, you select a disk image
and write it to a 1.2mb or 1.44mb floppy disk. There are a
variety to chose from, depending on your setup. A handy file
helps you chose. Since I was installing from an Enhanced IDE
CD-ROM drive, I needed to use "idecd" for my boot image. Since
my boot drive is a 3.5", 1.44mb drive, I used the "idecd" file
in the "boot144" directory as my boot image. I chose the
"umsdos" file as my root image since I was installing to a FAT
partition. Creation of the root and boot disks was easy and went
smoothly, using a neat little utility called "rawrite" which was
provided. There is also a point-and-click windows-based
boot/root disk creator for those that (for some reason) wish to
have a more painless experience.

Incidentally, I was pleased to learn that Linux no longer needs
it's own partition. It works best with it's own ext2fs format
partition, but it will coexist on a FAT partition without
damaging anything. This means that I didn't have to repartition
my hard disk, which I was quite thankful for.

Ok, step two. I put the Boot Disk in drive A: and rebooted. Up
popped a "Welcome to the Slackware Linux 2.2.0 bootkernel disk!"
message and I was asked if I had any special parameters. I hit
enter and booting continued. It loaded the boot disk onto a RAM
Disk and then I inserted the Root Disk. The Boot Disk contains
the Linux operating system and the Root Disk holds the
filesystem. It's too big to fit on a single floppy.

Finally booted up, I log in as "root," the master superuser
account of UNIX. Then I get to a Linux prompt, where I type
"SETUP."  From then on, installation is a flawless breeze,
courtesy the user-friendly colorful menued setup program. Linux
installation requires from 10mb to 150mb, depending on what you
install.

Success!

Linux was installed. It was incredible. I began to browse my
newfound directory structure. I played Doom for Linux,
Asteroids, and read info files. It was Neat.

X

It was great. But I wanted more. The next step was to setup
X/Windows. X/Windows is the Graphical User Interface for UNIX.
It's available for just about any flavor of UNIX and there are
many varieties available from different vendors, ranging from
free (Xfree or X11) to very expensive.

X-Windows for Linux is notoriously difficult to coax into
working. However, it was pretty straight forward in my case. The
main stumbling block is getting it to like your monitor and
video card, but I was fortunate in that my Genoa WindowsVGA card
was supported. Most cards are, in fact, supported, with Diamond
cards being the major exception.

The newer distributions of Linux come with a neat configuration
program for X11 which made installation quite painless. Having
configured it, I typed "xinit" and up came X-Windows. It was
pretty cool, my PC transformed into a sleek X-terminal...

Look for an article on more neat things you can do with Linux in
the next  issue.  Also, read the UNIX column.

Notes

Another free UNIX operating system exists for the 80x86
platform, FreeBSD. Look for a review in a future issue. Linux
and FreeBSD distributions are available from Chestnut,
InfoMagic, Walnut Creek CD-ROM, and other companies.

Linux CD-ROM Sources



InfoMagic
P.O. Box 30370
Flagstaff, AZ 86003-0370
Phone:  (520) 526-9565
Fax:    (520) 526-9573
E-Mail: info@@infomagic.com
Web:    http://www.InfoMagic.com/

Walnut Creek CD-ROM
1547 Palos Verdes Mall, Suite 260
Walnut Creek, CA 94596
Phone:  (800) 786-9907
Phone:  (510) 674-0783
Fax:    (510) 674-0821
E-Mail: info@@cdrom.com
Web:    http://www.cdrom.com/
FTP:    ftp.cdrom.com

(If you know of others, please send us
information)


~

UNIX

Welcome to the UNIX column of our Zine. In this column I will
conduct an ongoing UNIX tutorial over the next few issues of
this magazine. Knowledge of UNIX is very usefull for many
reasons. UNIX is the dominent operating system for powerful
computers and computers on the internet. If you ever plan on
installing Linux, being a successful Hacker, or getting a job in
the hi-tech computer industry, you will need to be familier with
UNIX.

UNIX is an incredibly powerful operating system however, with
it's mightly power, UNIX is a very complex and unfriendly
operating system. This brief article is to bestow upon the
average DOS-ite the basic navigation skills necessary to use
UNIX.  Future articles will delve into more advanced UNIX topics.

Like ice cream, UNIX comes in "flavors."  A UNIX flavor refers
to a brand of UNIX.  UNIX Flavors include Linux, BSD, Ultrix,
Irix, etc.



UNIX is, in many ways, similar to DOS.  It also has its
differences.  Like DOS, UNIX is text mode command-line based,
although it you may install a graphical user interface (GUI)
such as X-Windows.  Unlike DOS, UNIX was designed from ground
zero to be a multi-user, multi-tasking, multi-threading
networking and development platform.  Let's examine each of
these.

The multi-user capabilities allow one computer to be used by
multiple people.  The most obvious signature of the multi-user
system is that the first one must do when using a computer
runnning UNIX is to log in with a name and password.  Files and
directories may be owned by one person or a group of people.

Since UNIX is multi-tasking and multi-threading, multiple people
may be using the computer simultaneously and each person is able
to run more than one application simultaneously.
Multi-threading refers to the ability for a program to have
multiple parts which execute simultaneously.


UNIX is a development platform.  It is designed so that software
written for UNIX (including UNIX itself) is highly portable
between platforms (different computer types) and operating
systems.  It is also a networking operating system, that is,
UNIX is designed to help connect computers to other computers
and communicate between them.  Virtually the entire Internet is
run by computers using UNIX, although that is beginning to
change.

The UNIX File System

The UNIX directory structure is similar to DOS. That is, a
directory may have subdirectories, which may in turn have
subdirectories, etc. There are several anomalies, however, which
you must take into account.

First of all, UNIX uses the forward slant bar ("/") where DOS
uses the back slant bar ("\"). This is a general headache for
those that use DOS and UNIX.   For example, cd /usr/X386 is
correct.  cd\usr\X386 will not work.   In UNIX, the back slant
bar is used to denote case in situations where only upper-case
characters are available.  This is not as common as it once was,
but you will still run into times when you may only use upper
case characters.  Simply precede any character you wish to
remain in upper case with a back slant bar.  The remaining
characters will be converted to lower case.  This brings us to
an important point.  UNIX  is case sensitive.  Filenames may
have upper case and lower case letters in them, and you must use
the propper case when referencing them.

One feature of UNIX not found in DOS is the concept of a
"symbolic link."  (The new MacOS has something similar known as
"aliases.")  A Symbolic Link looks like an item in the directory
(a subdirectory, a file, etc) however, it points to an item in
another directory. This is usefull because you may want to have
one file in two different places; a symbolic link would let you
have one file appear in two different places, but physically
reside in only one directory, saving space.

In UNIX, many non-file items are mapped to the file system.
These include devices, found in the /dev directory, as well as
running tasks, found in the /proc direcory, to name a few. This
may be confusing, but it's actually quite handy. For example, on
my Linux system, /dev/modem is a symbolic link to /dev/ttyS01,
the second serial port.

The Shell

The Shell is the command interpreter for UNIX, the interface
between the operating system and the user. The shell is the
program that accepts your input and executes commands, etc.
There are several common shells, including the Bourne shell
(sh), the C shell (csh), the Korn shell (ksh), the restricted
Bourne shell (rsh), and the Bourne again shell (bash), as well
as ash. (command.com, 4dos.com, and ndos.com are shells for DOS.
The finder is the shell in MacOS).

You should now have a basic understanding of UNIX.  The best
thing to do now is to gain access to a UNIX system and play with
it.  The best way to do this is to either install Linux (an
excellent way to learn UNIX) or get a "shell account" somewhere.
 You can usually get a shell account if you attend college, or
sometimes high school.  Alternatively, you can get a shell
account for about $15 per month from an internet service
provider.  Shell accounts are available for the cost of a phone
call from free.org, which has an ad later in this magazine.
Ports (versions) of various UNIX shells are available for DOS,
OS/2, and Windows.  [Note: The Korn shell ported to OS/2 is
available as ksh.zip on The Digital Forest - Light Ray]

Below is a UNIX  Command Reference to get you started.  (It
continues on the next page.) Enjoy!

~

UNIX Command Reference

Command         Function

ls      List files - similar to DIR in DOS. Use the -a option to
list all files, including hidden files, -o option toggles color,
-l option toggles long (detailed) display.

cd <directory>  Change Directory - the same as in DOS except
forward slashes are used and their must be a space after cd.
Example:   cd /blort

pwd     Path Name - displays the name of the directory that you are
in

cat <filename>  Catalog - displays contents of <filename>

rm <filename>   Remove - same as DOS delete/del/erase command.
Erases <filename> from disk.

cp <src> <dst>  Copy - copies <src> to <dst>, just like the DOS
copy command.

whoami  Shows what account you are logged in as, in case you
forgot.

who     Shows what uses are logged in, with login date and time

ps      List System Processes - includes the Process ID (PID),
Terminal (TTY), time started, and the name of the command (CMD).
ps -u<user> will display only the processes owned by <user>.

kill    Kill Process - Use ps to get the process ID. Use either
the format kill -<strength> <pid> or kill <pid>. The process
with Process ID <pid> will be terminated. A Strength of 9 will
kill almost anything. You must be "superuser" to kill other
users's processes.

write <user>    Send a message to a user who is currently logged
in. After typing the command, type your message, line by line.
Each line will be sent as you hit return. Hit Control-D when you
are done.

mkdir <dir>     Create subdirectory called <dir>

rmdir <dir>     Remove subdirectory <dir>

mv <old> <new>  Moves or Renames <old> to <new>

echo text       Displays text

uname -m uname -n uname -r uname -s uname -u  uname -a uname
_help   Display Machine Type (ie "i486") Display Machine Name (ie
"Bob") Display OS Release (ie "1.2.1") Display OS Name (ie
"Linux") Display OS Version, For Example: #3 Sun Mar 19 06:43:08
CST 1995 Display all of the above Display help for uname

more <filename>         Displays the contents of <filename> with a
pause at each screenfull.

less <filename>         Displays <filename> and allows scrolling up and
down.





COMDEX:

A Cultural Experience

"This is comdex!" Yelled the Microsoft person, "We don't want
anything unless it's free!" he continued, then proceeding to
throw pins, pens and other paraphernalia into the mass throng of
important business people. This couldn't be anything but Comdex,
the largest annual information technology trade show and
convention in the world, where industry leaders bring the newest
technology to show it to the world, and get people to buy it.
Comdex is truly amazing, and is certainly a cultural experience
of another kind.

At about 11:30 PM on Wednesday, November 16, we arrived at our
hotel, on the outskirts of Las Vegas. Room rates jump up to 20
times the normal rates during the week of Comdex, that is if you
can even find a room. This is due to the hundreds of thousands
of comdex goers that flock in their annual mass migrations to
this gambling city.

In the morning of Thursday, we woke up and made the short trip
over to the Sands to eat breakfast. A strange thing about Las
Vegas is that people actually obey the speed limit. We were
driving through a 15 mph zone, and everyone was actually going
at exactly 15 mph. How strange, law abiding citizens?  After
wading through vast traffic, both human and automobile, we
arrived at the Sands. Upon entering the Sands and passing an
uncountable array of places to lose our money, we located a
place to eat. After our breakfast, we proceeded to Registration.

It was a large white tent, primarily deserted, but kept alive by
the trickle of people coming to "The Show" on the second to last
day. A trickle, that is, being a mere few hundred people per
hour. After waiting in the line, I came to one of about twenty
badge typists designated to that line. The badge typists looked
thoroughly fatigued and ready to go home, for what a monotonous
task they had. I handed my registration forms to the badge
typist that I had come to, which he entered into his terminal.
According to the forms, I was Tobin Fricke, CEO of TobinTech
Engineering. After he was done typing up the information, I
acquired my Comdex directory. The Comdex directory is a mere
index to the various booths at Comdex, yet it is 628 pages.
Naturally, it was alternatively available on CD-ROM. We walked
to the large Badge Printer, which was busy embossing the comdex
badges. We waited for our badges to be printed and borrowed
several unembossed cards from the machine in the process. When
mine finally came out of the machine, it read, "Tobin Frike, Big
Boss, TobinTech Engineering."  Well, the badge typist thought it
was funny...

At last, we were able to enter Comdex. We stood before the
convention hall, feeling a sort of awe. The building looked as
if it could be three stories tall. There was a large banner
across the entrance that said, "WELCOME TO COMDEX!"  The rest of
the building was plastered with ads, predominantly Intel's,
saying, "Come visit us at booth LN109!" We entered Comdex, and
left reality, through the line of glass doors. We were greeted
with a "No persons under 16 years of age permitted on the trade
show floor" sign and several security people. We just walked on
past, and then went up the escalators, pretending that we were a
few years older.

The inside of the convention hall was very much like an aircraft
hanger. It was huge. Vibrantly colorful signs and bold logos,
both those familiar and those alien, dangled from and filled the
skies of the comdexian universe. It was overwhelming. After the
initial euphoric shock was received, one notices the audio. From
one booth, you hear, "Come see our show and get a free
tee-shirt!!!" and from another you hear, "...has been the leader
in the industry for..." Voices from the hundreds of thousands of
people, voices from the exhibitors, all culminating in a
background comdexian roar that fills your ears. You are in the
Comdex.

Comdex is like most of the computer world, an equalizing
experience. In the real world, you are judged by what you look
like, how you talk, what you think. In contrast, cyberculture is
quite different. Everyone is judged by what they know and want
to know. For the most part, and innocent pion with sufficient
knowledge, such as myself, can strike up an interesting
conversation on an equal basis with the designers of the newest
technology in the computer world. You listen to them. They
listen to you. You understand. They understand.

The day passed quickly, and soon we were back at our car, with
several new tee-shirts, a couple CD's each, hundreds of
hand-outs, disks, pins, buttons, stickers, keychains, et hoc
genus omne. From this point, we explored the hotels and casinos,
ate a $4.95 Prime Rib dinner, and retired to our hotel.

Comdex is a unique experience. Comdex is a gathering of 195,000
people who share the same interests, a gathering of the newest
technology. The people that go to Comdex are not ordinary
people, for they have developed a culture of their own.

~Comdex occurs twice yearly, once in the Fall in Las Vegas,
Nevada, and once in Atlanta, Georgia. The Fall 1995 Comdex will
take place in the Las Vegas Convention Center, Hilton, and Sands
Expo and Convention Center, during the week of November 13 to
17, 1995. You may register online at http://www.comdex.com:8000.
An exposition pass may be obtained for free.



Spinning A Web Page



All of us have by now surfed the World Wide Web, or at least we
know someone who has or we have heard or read about it. After
about fifteen minutes of happy clicking, we dream of creating
our own cool spot on the web. We think about all the nifty
things we'd add to our homepage and how fellow surfers would
flock to it in awe.



Creating one's own homepage on the World Wide Web is not too
difficult, depending upon the aproach that you take. Two things
are needed to create a homepage. You need the page itself and a
place to put the page.



Constructing the Page

The first step is to design your page. Get out a few sheets of
paper and draw out what you want it to look like, or, for those
with photographic memories, do this in your head. Remember that
a homepage may consist of more than one pages. For example, you
can have something to click on that says "My Summer Vacation,"
which could go to another page about your summer vacation. Once
you figure out what your page is going to look like, you can
begin writing it.



A page consists of a file or a series of files in a format known
as "HTML," in addittion to files for all the graphical images
and sounds that you have on your page. HTML stands for
"HyperText Markup Language."  You can create an HTML format
document in any word processor that can output to straight text
or ASCII. The MicroSoft Windows Notepad, DOS Edit, and the OS/2
System Editor will all work. Also, most commercial word
processors can output ASCII files, such as Ami Pro. In
addittion, there are several specialized HTML editors which you
may use.



In HTML documents, markup "tags" define the start and end of
headings and titles, paragraphs, lists, character attributes
(such as bold, italic, etc) and links to other pages. Most
markups are identified in a document with a start tag, which
gives the element name and attributes, followed by text or other
information, then ended by the end tag. Start tags are delimited
by < and >, and end tags are delimited by </ and >. For example
"This is <b>bold</b>!" would appear as "This is bold!"



The first step in writing the HTML portion of your page is to
write the actual literal text in a text editor. Then, go back
and add HTML markup tags. It is completely possible to write it
all at once with HTML tags in the first place, but this is
rather confusing.



Once you have the text written, it is time to insert the HTML
markup tags. All HTML documents have the following basic
structure:



        <HTML>

        <HEAD>

        header elements

        <BODY>

        body text

        </HTML>



Since you have already written your body text, add "<HTML><HEAD>
<BODY>" to the top of your document and add "</HTML>" to the
end. Note that it does not matter what if there are line breaks
in HTML. The above is exactly the same as:



<HTML><HEAD>header elements<BODY>body text</HTML>



Now, go through the body text and add <p> to the beginning of
every paragraph and </p> to the end of every paragraph. Since
line breaks are ignored, this is necessay to have your document
formatted correctly. If you don't do this, your page will be
really messed up. You can assign a name to a paragraph by using
<p ID="blort"> instead of <p>, where "blort" is the title of the
paragraph. This name is invisible to anyone looking at your
page, and it's use will be explained later.



 The next step is to add  a header to your document. The header
consists of global information concerning the entire page, such
as the title. To title your document, add the following between
the <HEAD> and <BODY> tags:



        <TITLE>Insert the title of your page here</TITLE>



        Links

A link is something that, when clicked on, takes you to another
page or another location in the current document. A link is
inserted in the following manner:



        <A HREF="location">text</A>



"Location" is replaced with either a URL, a filename, or a pound
sign followed by the name of a named paragraph. "text" is the
text that will be displayed. When you click on that text, you
will be taken to the location specified by "location."   If you
have a named paragraph defined with <P ID="blort"> then you can
insert a link to it in the same document with <A
HREF="#blort">Go to Blort</A>. If you have another page that is
part of your homepage called splorg.html, then you can add a
link to it with "location" being "splorg.html". If you want to
add a link to IBM's homepage, then the following would work:

<A HREF="http://www.ibm.com/">Go to IBM's home page</A>.

Text Formatting

        HTML allows for many types of text formatting, such as bold and
italic. They all follow a basic format of start tags and stop
tags. To turn bold on, use <b>. To turn it off, use </b>. You
can use any other tags in between.



<b>test <i>test </b>test </i>test<p>

test test test test



Have fun with your HTML!

In the next issue, we will explore Images, Backgrounds, Color,
and other ways to spice up your home page!

~





WANTED: YOU The Carrier Wave is currently a volunteer operation.
 Most of the articles in this issue were written by one person
(me!).  WE WANT YOU TO WRITE FOR US! We can't pay you right now,
but we may be able to in the future.  However, we will give you
a pile of copies of the issue that your work appears in to give
to your friends or sell for a profit.  You know what kind of
artiles we want! If it is related to anything neat, then we want
it!  A list of topics to give you an idea of what we like
includes: Computers, networks, conspiracies, aliens, radio,
cryptography, neural networks, mathematics, fractals, TCP/IP,
Perl, X.25, serial communications, algorithms, graphics,
book/movie/software/hardware reviews, reviews of cons, pictures
from inside a cable vault, etc.  Contact Light Ray at
dr261@cleveland.freenet.edu or at the post office box mentioned
on the cover for more information!!!!





Upcoming Events

PumpCon

Comdex Fall 95  November 13 to 17, 1995. Register Online via the
Internet at  http://www.comdex.com:8000.  For a description read
the article in this issue.

HoHoCon         Hacker Conference in New Orleans, December 30, 1995 to
January 1, 1996.

DefCon IV       Hacker Conference, Las Vegas, Nevada, expected in
August.  Exact date and location as yet undetermined, for
contact information, see article in this issue.



A Beginner's Guide To The Computer Underground - Part I

Written By Pazuzu 24-Mar-1993 at 13:30 in Long Beach, CA



PREFACE

Pazuzu wrote this infamous BEGELITE.TXT file on the 24th of
March, 1993, when he lived in Long Beach, California.  Since
then, much has changed, however, this still remains the
definitive beginner's reference.  Comments enclosed inside
[square brackets] are my own (Light Ray.)

FOREWORD

I, nor any SysOp or User of ANY BBS on which this file appears
are in any way liable for any damages caused by use of
information or ideas contained in this file.  This file serves
only to describe  and introduce the Computer Underground as I
myself view it, not to encourage illegal activity of any kind.



INTRODUCTION

The intended audience of this file is someone who has been
modeming for a while, and who has through some means discovered
that there exists a Computer Underground, and who wishes to
learn more about said Underground, and perhaps become a member
of same. If this does not fit you, please     destroy all
on-disk (or tape) and hardcopies of this file and go about
your happy life as if you never heard of it. But, if this does
fit you,     read on!



UNDERGROUND DIVISIONS

The Computer Underground is basically (although quite loosely)
divided into five main branches and one minor branch. I say
loosely because there is much crossover between the branches.
The branches are (in no particular order):

Phreaks - May also be referred to as "phreakers", etc. These
people deal with the telephone grid. They want to learn all they
can about how it works, and how they can control it, which often
leads to making telephone calls for free (which is of course
illegal).  Often groups of Phreakers will band together and form
an organized group, and publish articles on the subject.

Hackers - These are the people who love computer systems (and
networks) and who love to find out how they work, how to get
into them, etc. A TRUE Hacker is not the malicious scum that the
Media and Hollywood  would have you believe, he is just someone
who loves computers and computer networks. There's nothing wrong
with logging into someone's computer, so long as you don't go
deleting files or stealing trade secrets. NOTE: Hackers and
Phreakers are very often combined into one group, referred to as
h/p or p/h (for "phreak/hack").

Carders - These people are admittedly criminals. They use credit
card numbers, checks, checking account numbers, whatever,
fraudulently to obtain whatever they want for free. However,
this isn't as bad as the media wants you to think: You are NOT
LIABLE for charges made on your CC [credit card] account that
you didn't authorize, so the bank has to eat it, and that's why
they have insurance...

Anarchists - In the sense it's used in the Computer Underground,
an Anarchist is someone who loves to play with fire, explosives,
etc. This is not all bad either... Who cares if someone makes an
explosion out in the desert just to see what will happen?
[There are two forms of anarchists.  There are those that really
are anarchists - that is, they beleive that there should be no
government - and there are those that call themselves anarchists
and like to blow things up.]

Warez - Although I have never been a real supporter of warez
people (in fact, I have fought bitter wars over BBSs with them
for years) they DO serve a needed function in the underground:
They distribute software. They are pirates. Most warez are
distributed by warez groups which exist for the sole purpose of
getting the software out to BBSs before the other group gets
that same program out.

Virus/Trojan Dudes (for lack of a better term): These people are
usually programmers (although not always) who are interested in
how viruses and trojan horses work and how to make them more
efficient. For those who don't know, a virus replicates itself
and waits around before doing anything harmful. The program
which simply formats your hard drive upon execution IS NOT A
VIRUS, it is a trojan horse. This is the "minor" branch I spoke
of  earlier.

With that out of the way, I must restate that these divisions
may not always be very clear or noticeable. It is very common to
see a BBS with stuff from all of them on it (mine is one such
system). I just wanted to detail all the various activities
which comprise the Underground.

I mentioned in several of the above descriptions that groups of
like minded modemers often get together and form an organized
Group and publish Magazines (electronically, as files on BBSs),
or distribute warez. Some of the most famous Groups (some are
LOOOONNNGGG gone) are: LOD (Legion of Doom), CHiNA (Communist
Hackers in North America), CuD (Computer Underground Digest),
Phrack, P/HUN (Phreakers/Hackers Underground Network) - p/h
groups; THG (The Humble Guys), INC (International Network of
Crackers), the FiRM (First in Releasing Most) - warez groups. Of
course, there are/were MANY more, these are just     the most
common ones you'll see being referred to.



 TERMINOLOGY



Many new Undergrounders have trouble figuring out all the
terminology used and are of course afraid to make a post asking
for help for fear of looking lame, so I'll help with a simple
list...  [Of course, the opposite is also true.  You don't want
to use terminology excessively when you don't know what it
means.]



[A] General Underground Terminology



Data: This is the handle of someone who used to be a modemer. He
is now a worm feast (corpse). He basically pissed off too many
people by being a lame [beep] [beep], and got KILLED.  His real
name was Stuart Tay, I'm sure you've heard of him.  This term is
really great, and has SO, SO many uses... "He's a Data" ... "He
pulled a Data" ... etc etc etc  [However, this is fairly
escoteric and very infrequently used.  It's important to also
note that "Data" is a term refering to any collection of
information.]

Lamer: This is someone who claims to be knowledgeable/active in
some area of the underground, but in fact knows/does nothing. An
example would be a 2400bps user claiming to be a great warez
courier.

Leech: This is someone who calls BBSs and just downloads
everything in sight without contributing anything (or uploads
garbage just to get credits).



[B] Phreaking/Hacking Terminology



Extender: This is an important phreaking term. It refers to the
number you call when accessing a Long Distance Carrier's
service. An example is 950-1493, which is ThriftyTel's Extender.

ANI: Stands for Automatic Number Identification. If you call a
telephone number that has ANI, your number (and sometimes
address) shows up on a console at their location (or is logged
to a printer, disk file, etc). This is bad, since most private
long distance carriers use it to see who is calling their
extenders.  [This is usually known as Caller Identification,
CallerID, or CID.  More often ANI refers to a system where you
dial a number and the phone number that you are dialing from is
read off using a synthesized voice.  This is usefull in
troubleshooting and beige boxing.  Try calling 1-800-MY-ANI-IS
for an example.  Also, almost all 1-800, 1-900, and x11
(411,611,911,etc) numbers have CallerID.  CallerID will
theoretically be available nationwide for residence by 1996.]

ESS: Stands for Electronic Switching System. It is the system
most Bell Organizations use to switch calls. It is what makes
horrors like ANI possible.  [Also, such wonders as the Blue Box
and Black Box don't work on ESS]

Gestapo: This is used to refer to any security/law enforcement
agency. Its meaning should be obvious...

SS: Stands for Secret Service. Any similarities between "SS"
being used to refer to the Secret Service and the "SS" of Nazi
Germany during World War II is by no means coincidental, believe
me.  [The Secret Service protects the president and other
important people and busts hackers.  Wierd combination.]

CNA: This acronym stands for Customer Name/Address (also could
be CNL - Customer Name/Location). Basically, if you have the CNA
dialup for an area code, and someone's fone number in that area
code, you can call the CNA dialup and give their fone number,
and get their name and address. This is not as easy as it sounds
since some CNA dialups require talking to an operator, which may
be suspicious of you, plus you need the code. Some CNAs are
automated where you call and enter the number on a fone keypad,
then the code.  Some you call with your modem.  [Rumor has it
that CNA has been abolished and replaced with something new.
Not sure about this]

COSMOS: The fone company's operating system.

NPA: Stands for Numeral Prefix Allocation. An area code in
layman's terms.

Code Hacker: A program which repeatedly dials an extender,
trying different codes, and logging which ones are valid. This
is the main method which most phreaks use to get their fone
calls.

Telenet: This is a large network of computers. You call a
Telenet dialup, then if you know a machine's NUA (its address),
you type it in, and connect. This is good because there are
Telenet dialups local to everywhere, and then you can connect to
computers on the network no matter where they are. Other
networks like Telenet include Tymnet and the Internet (the
largest network on earth, a network of networks, really).
[Telenet and Tymnet operate on the X.25 protocol while the
Internet operates primarily using TCP/IP.  This is not to say
that they are not interconnected, however.]



[C] Carding/Scamming/Etc Terminology



CBI: This is a multi-use acronym which stands for Credit Bureau
Information. It is used to refer to: [1] the information given
by a credit reporting agency [2] the concept itself [3] a code
used to access such a service [4] it is also used by one such
reporting agency (namely Equifax) to refer to itself.
Basically, if you have a CBI access code (normally just called
"a CBI"), you can call a CBI dialup, enter the code, someone's
name and address (or their Social Security Number), and you will
get all credit info on them, including account numbers.  This is
quite useful as I'm sure you can see.

Drop Site: This is where the carder would have the carded
merchandise         sent to, since only a Data would send the
shit to his own house.



[D] Warez Terminology



Cracker: This is the person who actually breaks the copy
protection on a piece of software. This often involves using hex
editors, etc., and is usually quite difficult.

Courier: This is a person whose sole job is to upload the
cracked warez to as many BBSs as possible so as to distribute
the software as widely as possible.



[Warez: Pirated Software.  Formerly pronounced "wares" but I've
heard a lot of people pronouncing it "wear-ez."]



This is most of the terminology you will see popping up in
message bases and text files. I haven't (by any means) covered
all of the terms out there, but these are some of the most
common, and should help.



[In part II, we will cover techniques!]



Australian Military Bans Windows 95


The Australian Navy has banned the use of MicroSoft Windows 95
on its computers based on reports that Windows 95 sends
information from a user's computer back to MicroSoft.  The
"Registration Wizard" software which is integrated into Windows
95 has been previously described as a "viral routine" by
MicroSoft.  Now MicroSoft is saying that  it examines "the first
six applications found" and reports the findings back to
MicroSoft.  (It's probably for market research, but it's scary
giving ol' Bill a window into your computer and private data.)



Russian Hackers Hack Citibank, Move Money, Get Caught.



Russian hackers transfered a total of over ten million dollars
through the Citibank electronic funds transfer system from June
to October 1994.  The group of hackers was led by Vladimir
Levin, a 24 year old Russian employed by AOSaturn, a software
company, who had broken the Citibank  security system.  He and
six other people are now under arrest in London.



Catholic Net!



The Catholic Church has become one of the first major world
religions to have an official web presence.  See for yourself at
http://www.catholic.net. Yes, soon you will be able to confess
your sins via email!



Double Big Mac for $60

Connectix recently released their new Speed Doubler for
PowerMacs.   This software, available for a street price of
$60-$70 replaces the inefficient 68000 emulator from Apple.
Since most Macintosh software consists mainly of 68000 code
instead of native PowerPC code, this software effectively
doubles, triples, or quadruples the speed of a PowerMac.



Hackers Hack Hackers

Hackers from the Internet Liberation Front (ILF) hacked the
computer at DigiPlanet which held the home page for the movie,
Hackers.  They edited the text and graphics to tell the world
what they thought of the movie.  Strangely, instead of just
putting the old page back, DigiPlanet put the old page back and
added a link to the hacked page.  There's more than a little
speculation that DigiPlanet intentionaly ran an insecure system
to facilitate a hack for media attention to the movie, Hackers,
which at the time, was not yet released.  The bug exploited in
the hack was a world exported network file system (NFS) mount.
The hacked page is at
http://www.digiplanet.com/hackers/hacked/index.html.



Burning Apples

The Apple Macintosh PowerBook 5300 series has been recalled due
to several cases of them "bursting into flames" while in use.
Apple will continue manufacturing these computers with an older
type of battery that does not self ignite.



London Underground Hacked

A newly-recruited employee of the London Underground (that is,
the subway company) managed to hack into the system controlling
the dot matrix displays throughout the "tubes" on August 16th,
displaying joking messages such as "All signalmen are weeners."
Needless to say, he's no longer an employee.



Euro-Clipper!

The European Council approved a measure on September 8 to take
steps to make strong encryption illegal unless the key(s) are
supplied to the government(s).



Fake Check Successfully Deposited

Patrick Combs successfully deposited a fake check that he
received in the mail for $95,093.35, although the check had the
words "not negotiable for cash" on it.  For the details of this
interesting story, see
http://www.dnai.com/g-think/$tablecontents.html.



AOL Bust

A two year FBI investigation of AOL (America Online) and its
members has culminated in the search of 125 homes and 12 arrests
for illegal pornography distribution.



The Story Of DnA Systems



DnA Systems, Inc. II is a computer bulletin board system
operated by the husband and wife team of Pazuzu & Zevaluz
located in Klinton Township, Michigan.  It is a BBS like no
other, for it houses the most diverse collection of message
bases and files assembled anywhere.  And all of this information
is accessible by anyone, free of charges other than normal phone
rates.

The system began its long and illustrious life back in the Fall
of 1989 as  a closed access phreak/hack system in Anaheim,
California called  Motel 666. The system was first put up
running WWIV 4.11, but soon after switched to Revolution when
Pazuzu joined the Revolution programming team.  By the time
Summer 1990 rolled around, Motel 666 was the second biggest p/h
system in Southern California, and the number of illegal calls
logged to 714-229-8513 was, to quote U.S. Sprint, "obscene".
Sometime around December 1990 January 1991, financial troubles
forced the sale of the computer which ran the system and Motel
666 went down.

In late 1991, Pazuzu again put the system back up, again as a
closed  access underground system under various names (couldn't
decide on the perfect name). Now located  in Costa  Mesa,
California  at 714-646-9180,  the system was ran under various
BBS packages, finally ending up with LSD.  But soon after, more
financial problems arose  and again the  sale of the  computer
which ran the board was forced.

In the Spring  of 1993, the  system was again  put on-line at
the same phone number, this time running Renegade 04-16 and
named Minas Morgul.  Soon after, Pazuzu co-founded the
electronic magazine known as DnA, and the system's name was
changed to DnA Systems, Inc.   Around August, a user named
Zevaluz first logged onto DnA.  By the time November rolled
around, Pazuzu and Zevaluz were very much in love,  and Zevaluz
proposed (!!!!!)  to Pazuzu, and not  being a fool, he accepted.
  Soon afterwards,  the question  of who  moves where was posed.
  You see,  Pazuzu  still  lived  in California, while Zevaluz
lived (lives) in Michigan.   Given the high crime rate and
obscenely high cost of living if California, the choice was easy
and Pazuzu made plans to move to Michigan.  Now, moving out of
state is far from cheap, and the board would have to go down
anyway, so Pazuzu sold the computer which ran DnA.  DnA went
down around January 5, 1994.

 It's now  late August 1995, and we're happily married (as of
September 30, 1994).  We've been through a lot in the 18 months
we've been together, including having a totally unexpected baby
(born March 2, 1995).  We've finally, as of May 1995, got our
BBS back up under the name DnA Systems, Inc. II to denote the
second incarnation of DnA Systems, Inc.

There are several things which  make this incarnation of my
system different than all the rest.  The first and foremost is
that I am much older and  wiser now than I was in 1989.  I was
18 then, I'm 24 now.  I'm in a much different life  situation
now  --  I'm  married,  happily,  and have a very secure and
wonderful job as a programmer for a software company.  The
second is that the computer which runs DnA doesn't even belong
to me -- it's a fringe benefit on loan from my company --  this
means I can't sell it.  The system is finally "here to stay".

On the technical side, the system is composed of a carefully
selected, high performance mix of hardware and software.

On the hardware side, the system is composed  of: an SiS chipset
Pentium motherboard using the PCI bus standard with a built-in
high performance NCR 53c810 SCSI controller, an Intel 90  MHZ
Pentium CPU, 16MB of 72-pin  memory, an  ATI  mach32
accelerated  graphics  card, a Creative Labs Sound Blaster
AWE/32, a Micropolis 2110 (1GB) SCSI  hard disk, a Micropolis
2217 (1.7GB) SCSI hard disk, an NEC 4Xi Quad Speed SCSI CD-ROM
drive, a WangTek 1300 SCSI DAT drive, a USRobotics Sportster
v.34  modem, a Teac 1.44MB 3.5" disk  drive and a Samtron 15"
monitor.   All of  this (except  the monitor  & modem, of
course) is housed in a black mid-tower case.

On the software side,  the system runs on the best products
available.   Our operating system of choice is IBM's OS/2
Version 3 ("Warp").  This is set up following the hints given in
Tobin  Fricke's OS/2 Sysop's FAQ -- those hints give a 4-5X
speed increase over stock OS/2.   We are using Ray Gwinn's SIO
version 1.45A to handle our serial ports -- the only way to do
things under OS/2.  To handle our FTN network traffic, we use
Chris Irwin's D'Bridge, version 1.58.  This also packs &
unpacks our echomail.  For file echo (TIC) processing, we use
Allfix, version 4.31E, the standard TIC processor for 1995.
Our BBS  software is Windowed Modem  Environment  (WME), version
1.10-A7, written by  Jason Fesler, and  now being developed  by
Tom Ordelman. This software  is extremely  configurable, very
unique, and  has a very wide variety of message base standards
supported (JAM, Squish, Husdon, *.MSG).

We offer our  users the most  diverse collection of  message
bases and  files ever assembled.   We are, to  quote Reverend
Ivan  Stang, "plenty blasphemous enough to qualify for temple
[of the Church of the SubGenius] status".

We are a member  of no less than  10 FTN's (Fido Technology
Networks).  They are (in no particular order):

DnANet (we're the Eastern u.S. HQ - 66:810/0):  This is a net I
started  back in 1993 when DnA Magazine became popular.  It's
still going today. Topics discussed include phreaking, hacking,
viruses, bombs, taxation, personal Sovereignty, and Law.

CyberCrime International (66:2810/110):   This network started
quite a while ago (1992 I think), and I was one  of the first
nodes, back when I was still in California.  It's the best
underground network ever.  Topics include: wares (pirated
software), ANSi  & ASCII art, phreaking, hacking, explosives,
data encryption, and the Internet.

GODNet (143:1810/2000  - 810  hub):  This network exists mostly
as a file network, but has several message areas as well.
Topics include music, the occult, and sex.

PatriotNet (976:1776/1493):  This is a network catering to true
Patriots (which both operators are).  Topics include militias,
government massacres, Sovereignty, and firearms.

MasqueNet (235:2109/103):  This network is headquartered in
Australia and is geared towards those interested in the Gothic
culture.  Topics include: body modification such as tattooing
and piercing, murder, vampires, and Gothic music.

NuitNet (666:666/1493):  This network is geared towards the
serious occultist (again, which we both are).  Topics include:
tarot, rituals, voodoo, tantra, Thelemic orders, and thee Temple
ov Set.

50h-Net (101:220/200 - Eastern Michigan Hub):  This is a
programmer's network (I program professionally).  There are
areas for C, Pascal, BASIC,  assembly, communications
programming, etc.

NuKENet (111:810/0 - Michigan Hub):  This is the network run by
the infamous virus research and authoring group NuKE.  Topics
are all virus-related.

FidoNet (1:120/472):   The largest FTN (obviously) in the world.
 While we don't actually receive any echomail from Fido, we
maintain an address so we can receive and send mail to any Fido
node in the world.

 We also have a huge collection of files available for download.
 We are actually one of the few systems in the world that
constantly

generates new Occult and Political text files.

While our file collection is much to voluminous to list out
here,  our files include:  music lyrics; BBS software; network
utilities;  Chaos magick; voodoo;  astrology; Temple ov Set
files; hacking utilities; phreaking utilities; viruses; virus
creation kits; DnA Magazine; Phrack; P/HUN; Cult ov thee Dead
Cow; ATI;  UxU;  carding text files; info on: waco, weaver,
taxation, sovereignty, Law; complete text of the entire United
States code; Satanism; Linux; Holy Temple of Mass Consumption;
The Stark Fist of Removal Online; Church of Euthanasia; info on:
Marijuana, MDMA, LSD, Crack, Heroin, 'Shrooms... and the list
goes on.

And all of this Data is accessible by anyone with a modem
capable of speeds at or above 300 bits per second.   There are
no post-to-call ratios, upload-to-download ratios, fees, tests,
or anything to stop you from downloading every file on the
system if you so choose.  Posting is not required.  We would
rather have no messages than a bunch of bullshit "jack up the
ratio"  messages.   However, we've found that this arrangement
actually encourages posting.  The first time you call,  you'll
go through a standard new user logon procedure.   Feel free to
lie about your address, real name, phone number, gender, age, or
whatever.   You will then be logged off. However, within 8
hours, you WILL be granted access by the operators and may call
back and do whatever you wish.

We realize that no everyone will agree with everything on our
system and 90% of people will likely  find something on the
system which offends them.   If you find that something on the
system offends you, please behave as an adult and simply remove
the offending file area or message base from your newscan and
forget it exists.

 Well, the only remaining piece of information about the system
you need is the phone number.  It's (810)792-0032.

Hope to see you online soon!

--

This joke looks to be pretty public domain. I also like it. So
this is my selection for joke of the month. - Carolyn, net.humor
supplier for The Carrier Wave.



  New York, __ -- People for the Ethical Treatment of Software
(PETS) announced today that seven more software companies have
been  added to the group's "watch list" of companies that
regularly  practice software testing.

  "There is no need for software to be mistreated in this way so
that  companies like these can market new products," said Ken
Granola,  spokesperson for PETS.  "Alternative methods of
testing these  products are available."

  According to PETS, these companies force software to undergo
lengthy and arduous tests, often without rest, for hours or
days at a  time.  Employees are assigned to "break" the software
 by any means necessary, and inside sources report that they
often joke about "torturing' the software.

  "It's no joke," said Granola.  "Innocent programs, from the
day they  are compiled, are cooped up in tiny rooms and
'crashed' for hours on  end.  They spend their whole lives on
dirty, ill-maintained  computers, and are unceremoniously
deleted when they're not needed anymore."

  Granola said the software is kept in unsanitary conditions and
is  infested with bugs.

  We know alternatives to this horror exist," He said, citing
industry giant Microsoft Corporation as a company that has
become  extremely successful without resorting to software
testing.

                         -From Somewhere on the Internet


The following is an actual alert to IBM Field Engineers that
went out to all IBM Branch Offices.  The person who wrote it was
serious.

Abstract:  Mouse Balls Available as FRU (Field Replacement Unit)
 Mouse balls are now available as FRU.  Therefore, if a mouse
fails to operate or  should  it  perform erratically,  it may
need a ball  replacement. Because  of the delicate nature of
this procedure, replacement of mouse balls should only be
attempted by properly trained personnel.

   Before proceeding, determine the type of mouse  balls by
examining the underside of the mouse.   Domestic balls will be
larger and harder than foreign  balls.    Ball removal
procedures   differ  depending  upon manufacturer of the mouse.
     Foreign balls can be replaced using the pop-off method.
Domestic  balls   are replaced  using the  twist-off method.
Mouse  balls  are not   usually  static sensitive.  However,
excessive handling can result in  sudden discharge.  Upon
completion of ball replacement, the mouse may be  used
immediately.

  It  is  recommended  that  each replacer have a pair of spare
balls for maintaining  optimum  customer satisfaction,  and
that  any  customer missing his  balls should  suspect  local
personnel  of  removing  these necessary items.



To re-order, specify one of the following:

P/N 33F8462 - Domestic Mouse Balls

P/N 33F8461 - Foreign Mouse Balls


VIRUSES - OCTOBER UPDATE


BOBBET VIRUS: Removes a vital part of your hard disk then
re-attachs it. (But that part will never work again.)

OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to
80MB, and then slowly expands back to 200MB.

AT&T VIRUS: Every three minutes it tells you what great service
you are getting.

MCI VIRUS: Every three minutes it reminds you that you're paying
too much for the AT&T virus.

PAUL REVERE VIRUS: This revolutionary virus does not horse
around. It warns you of impending hard disk attack---once if by
LAN, twice if by C:>.

POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but
instead refers to itself as an "electronic microorganism."

Carolyn Meinel (cmeinel@unm.edu) is a technology broker, which
is a wool-business-suit way of saying she is a freelance
wheeler-dealer in the world of cool inventions.  She is
embarrassed to admit that her favorite programming language is
Fortran 77. She has written 6 really boring and expensive books
with titles such as "World Intermodal Systems Markets," PRS
International, Newtown, CT, 1995. Those curious to learn about
her seriously entertaining stunts are encouraged to run, not
walk, to the nearest bookstore and buy "Great Mambo Chicken &
the Transhuman Condition: Science Slightly over the Edge," by Ed
Regis, Addison Wesly, 1990, paperback. Hint: I start out in the
book under my ex-married name, Carolyn Henson. Or, if you can
dig up a real collector's item, you can check out what a
megababe I was almost 20 years ago in the Genetic Hall of Fame
in the book "The Intelligence Agents" by Dr. Timothy Leary,
Peace Press, Culver City CA, 1979.



The Conscience of a Hacker
Written By  The Mentor on January 8, 1986

Another one got caught today, it's all over the papers.
"Teenager Arrested in Computer Crime Scandal", "Hacker Arrested
after Bank Tampering..."

Damn kids.  They're all alike.

But did you, in your three-piece psychology and 1950's
technobrain, ever take a look behind the eyes of the hacker?
Did you ever wonder what made him tick, what forces shaped him,
what may have molded him? I am a hacker, enter my world...

Mine is a world that begins with school... I'm smarter than most
of the other kids, this crap they teach us bores me...

Damn underachiever.  They're all alike.

I'm in junior high or high school.  I've listened to teachers
explain for the fifteenth time how to reduce a fraction.  I
understand it.  "No Ms. Smith, I didn't show my work.  I did it
in my head..."

Damn kid.  Probably copied it.  They're all alike.

I made a discovery today.  I found a computer.  Wait a second,
this is cool.  It does what I want it to.  If it makes a
mistake, it's because I screwed up. ...Not because it doesn't
like me... ...Or feels threatened by me... ...Or thinks I'm a
smart ass... ...Or doesn't like teaching and shouldn't be here...

Damn kid.  All he does is play games.  They're all alike.



And then it happened... a door opened to a world... rushing
through the phone lines like heroin through an addict's veins,
an electric pulse is sent out, a refuge from the day-to-day
incometencies is sought... a board is found.

"This is it... this is where I belong..."

I know everyone here... even if I've never met them, never
talked to them, may never hear from them again... I know you
all...

Damn kid.  Tying up the phone line again.  They're all alike...

This is our world now... the world of the electron and the
switch, the beauty of the baud.  We make use of a service
already existing without paying for what could be dirt-cheap if
it wasn't run by profiteering gluttons, and you call us
criminals.  We explore... and you call us criminals.  We seek
after knowledge... and you call us criminals.  We exist without
skin color, without nationality, without religious bias... and
you call us criminals.

You build atomic bombs, you wage wars, you murder, cheat and lie
to us and try to make us believe it's for our own good, yet
we're the criminals. Yes, I am a criminal.  My crime is that of
curiosity.  My crime is that of judging people by what they say
and think, not what they look like. My crime is that of
outsmarting you, something that you will never forgive me for.

I am a hacker, and this is my manifesto.  You may stop this
individual, but you can't stop us all... after all, we're all
alike.



May The Mentor's Words Be Long Remembered


[The following are the contents of various
 floating frames and such that could not
 be reproduced in the ASCII version of TCW.]

--------------------------------------------

Amendment I.

        "Congress shall make no law respecting an establishment of
religion, or prohibiting the free excersize thereof; or
abridging the freedom of speech, or of the press, or the right
of the people peaceably to assemble, and to petition the
Government for a redress of grievances."

------------------------------------------------------------------
 Private Line

Private Line is published six times yearly by Tom Farley. It is
described as "a journal of inquiry into the telephone system."
The last issue had 119 pages, containing detailed information on
the "Outside Plant" of the Phone Company, Pay- phones, Debit
Cards, Telephone repair and more. Tom takes you  up telephone
poles and down into cable vaults in part one of his detailed,
fully illustrated exploration of the "Outside Plant."

        For a sample issue, send $4.50 to 5150 Fair Oaks Blvd.,
#101-348, Carmichael, CA 95608 USA. Text of back issues is
available via ftp or gopher from etext.archive.umich.edu in the
/pup/Zines/PrivateLine directory. You may email Mr. Farley at
privateline@delphi.com.

------------------------------------------------------------------

FREE.ORG is offering free shell accounts, SLIP, PPP, and UUCP.
Just dial them up with your modem at (715) 743-1600

------------------------------------------------------------------

The Carrier Wave
PO Box 835
Lake Forest, CA 92630-0835

Send $4.00 for a sample issue.  Please include your name, address,
electronic mail address, home page URL <if any>, favoriate quote
<optional>, and the number of the last issue that you have if you
have one already <so we don't send you a duplicate>.

------------------------------------------------------------------

END OF TCW.1.1.TXT


--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--

==========================================================================

  THE CARRIER WAVE SUBSCRIPTION REQUEST FORM

==REQUIRED================================================================

  Name (Or Psuedonym): _____________________________________________

  Postal Address Line 1: ___________________________________________

  Postal Address Line 2: ___________________________________________

  Postal Address Line 3: ___________________________________________

  Last Issue that you have:  Volume I, Issue ________       [ ] None

  Number of Issues you want: ______________________

  Funds enclosed:            US$_______ . _________

                             [ ] Check  [ ] Money Order  [ ] Cash

==OPTIONAL================================================================

  Electronic Mail Address: _________________________________________

  Home Page URL:           _________________________________________

  Favorite Quote:          _________________________________________

                           _________________________________________


==NEXT....================================================================

  Include $4.00 United States currency in Cash, Check, Or Money Order.
  All funds must be drawn on a U.S. Bank.  Make check/MO out to
  Tobin Fricke.  We aren't responsible due to lost orders or damaged
  copies of TCW.

  Mail to:

    Carrier Wave Publications
    PO Box 835
    Lake Forest, CA 92630-0835
    United States Of America

==========================================================================

--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--cut--