💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › RICUS › ricus201.txt captured on 2022-06-12 at 14:10:42.

View Raw

More Information

-=-=-=-=-=-=-

  ____________________________________________________________________
 |  ___     __       __ |                       |                     |
 | |___) | |   |  | (_  | Rhode Island Computer | Volume 2, Issue 1   |
 | |   \ | |__ |__| __) |  Underground Society  | January, 1993       |
 |______________________|_______________________|_____________________| 
                                           
       
         ======================================================= 
          RICUS Vol. 2, Iss. 1                Table of Contents 
         =======================================================
           1 .. Opening to RICUS 2.01   
           2 .. Introduction to the UNIX OS (Part 1)   
           3 .. Definition of 'Hacker'
           4 .. How to By-Pass Callback Verifiers
           5 .. Idiotic Submission: What to do w/the Homeless
           6 .. Update: List of RI Fido Systems
           7 .. PedoFile.Txt - Fake BBS Ad - A Fine Squinky File 
           8 .. Radio Scanners
           9 .. OMNI-Net NodeList/Conference Tags
           10 . Closing/Submitting Articles to RICUS                   
         =======================================================
               
 
  ---------------------------------------------------------------------   
  1: Introduction
  ---------------
 
     Hey there!  Welcome to RICUS 2.01! In this issue, we provide
   you with some interesting information. Information can be good or bad,
   it is up to the individual user of such information to ensure that it
   is used properly. Info can also be amusing... use it wisely...    
      
     Remember, cyberspace can be fun. It can also be dangerous, excercise
   caution at all times.

                CyNom/RICUS Editor 
                
                 
  You may have noticed a change in the editing alias. Alas, we must change
 the editor alias from time to time, whether the editor changes or not!
 
 --------------------------------------------------------------------------  
 2: Introduction to UNIX
 ----------------------

  1.1  What is UNIX?
       -------------
      UNIX is an OS developed by AT&T in the 1970's. It's not really a
   mainstream OS like MS-DOS, though I'm sure some people will disagree
   with me on that. It is primarily used in colleges/universities and by
   businesses with the need for multiuser support.
    
     UNIX is multiuser, meaning more than one person can use the same 
   computer at the same time. This is done through terminals hooked to a
   main CPU. Modems (of course) can also be attached, to allow multiple
   users to dial-in. Many UNIX systems are also on networks.
    
     It is also multitasking. This means each user can run more than one
   program and switch between them.
   
 1.2  How do I identify a UNIX system?
      --------------------------------
      The easiest way to identify a UNIX system is by its login screen.
   Upon accessing a UNIX system, either by remote or by local terminal,
   you will see the following display (assuming you are not already
   logged on):
    
    
         generic.unix
      
         Welcome to the Generic Unix with Computer People who
         don't have a clue what they're doing!
         
         The System will be backed up around 2 pm Monday!!!
       
         login:       


   You may also see 'Login:' in place of 'login:' (notice the caps.)
   The login prompt makes it easy to distinguish a UNIX system.
   
   The login: prompt is asking you for a username. There are frequently
   default logins that come with a UNIX system, and these are sometimes
   left unpassworded, due to the incompetance of most system administrators.
   
   Some common default UNIX login names:
    
       backup
       demo
       demos  
       guest
       help
       lp
       news
       tutor
       bin   _
       uucpa  \    
       nuucp   >--|These will not give you a shell (Unless you're lucky!!)
       uucp  _/   |They will usually give you the uucico program, part
                  |of UUCP which will be covered in future chapters of
                  |RICUS UNIX tutorials.

  If the account has a password, it will give you a Password: prompt.
  Otherwise, you will be logged in.
  
  There are sometimes also other defaults, like 'games' or something,
  that the users may have installed for one reason or another.
  
  There is also sometimes another way to identify a unix system and/or
  get more info on that particular UNIX. Login as "sync" (without
  the quotes.) If it is a valid account, the system will print a message
  like this:
   
      login: sync
      SunOS Release (386STD) 4.1.3 on node generic
       
      [...and then logs you out...]
 
     Smart Admins will have gotten rid of this account, since it makes
   it really easy to make sure that a computer is, indeed, a UNIX!    
          
 2.1  The Shell
 ---  ---------
       
      After you have somehow logged into a UNIX. You will be at a Shell
  prompt. The prompt will be something like:
   
    %     
    nodename %
    /usr/user %
    etc...
     
    Whatever it is, you are most likely at a UNIX shell. Type 'pwd'
    at the shell prompt, and it'll Print your current Working Directory
                                   ^                  ^       ^
                                   
    By the way, UNIX is entirely case sensitive. 'pwd' is NOT the same
    as 'PWD', '
   
    Entering 'pwd' is the same as entering CD on an MS-DOS system, without
    any options. 
    
    The 'cd' command allows you to change directories.
    Some common UNIX commands:

    Command               Description
    ==============        ============================================
    ls                    lists files, UNIX equivelant of MS-DOS 'DIR'
    cd                    change dir, UNIX equiv of MS-DOS 'CD'
    pwd                   Prints current Working Directory (like MS-DOS
                          'CD' without any args!)
    set                   lists/sets environment vars
    echo                  prints text
    cat                   views a textfile (like MS-DOS 'TYPE')
    kermit                start kermit front end (for downloading
                          files) -- Not present on all UNIX systems
    sz                    send ZModem, sends a file FROM the UNIX
                          (Not on all UNIXes)
    rz                    recieve ZModem sends a file TO the UNIX
                          (Not on all UNIXes)
    man                   obtain help on a command
    rm                    delete/remove file
    mv                    move/rename file

    Note: Certain commands, such as sz, rz, and kermit, may not be found
          on particular UNIXes.
          
    Those are some of the more common/useful commands, which will
   allow you to obtain text, navigate directories, list them, etc.
   You can get help on a command (usually) by typing 'man command'
   without the quotes, where "command" is the command you want help
   with.

   Most commands provide a short summary of there arguments. Type
   "command -?" (without the quotes, of course!) to see this short
   arg summary.

   You can redirect the output of commands using the '>','<', and
   '>>' operators, just like MS-DOS.

   To write the output of ls /bin to a file, you could use:
   ls /bin >file

   To view this output, you could then type
   cat file

   To see a list of many other commands type "ls /bin" The directory
   /bin contains many system binaries/commands. You can also try
   "ls /usr/bin" which possibly lists additional commands.

   Try fooling around with commands and experiment. If you're reading
  this, you probably have some type of intelligence in that brain of
  yours!

            However, please remember that if you are 'borrowing'
   someones account (with their permission, of course), *never* delete
   (or modify) any files that aren't yours! This is just common courtesy.
             
    
 2.2   UNIX Directory Structure
 ---   ------------------------
  
   UNIX utilitizes a file system. At the top of this filesystem is the root
 directory. Under this root dir, there are subdirectories, subdirs within
 subdirs, files within subdirs, etc.
   The root dir is represented by a '/' (slash)
   An example unix directory tree:

                      / (root dir)
          ____ ____ __|__ ____ ____
         |    |    |     |    |    |
        usr  bin  dev   etc  var  tmp (dirs)
    ____|__ _____                  
   |   |   |     |                 
  jon mat guest games                 (sub-dirs... etc)  
                 
     In the sample directory tree above, the root dir has 3 subdirs under
  it (usr, bin, and dev.) Within usr, the 'home directories' of users
  jon, mat, and guest exist. The home directories are the dirs that the
  user is initially logged into. You can change back to your home dir
  using cd $HOME. To find out your home dir, type echo $HOME. Both at shell
  prompts.
    
    The current directory can be represented by a . (a single dot), the
  previous dir can be represented with a .. (double dot), just like
  MS-DOS! For example, say you were in directory /usr/guest. To move back
  to /usr, you could type cd /usr OR type cd .. Obviously, cd .. is 
  preferable, since it requires less typing!
   
      That's the end of RICUS Intro to Unix, Article 1. In future issues
  of RICUS, we will continue to provide you with more UNIX information.
  Article 2 will probably have information on networking, one of the most
  interesting and fun use of a UNIX.
  
   It is important to note that the BEST source of UNIX info is actual
  experience in use of Unixes!
  
 * UNIX is a trademark of Unix Systems Laboratories. (We think.)
 
 [Disclaimer: RICUS does not promote the hacking of any type of computer,
  UNIX or otherwise, for malicious and destructive purposes.
  Mis-application of the above information is your responsibility, not ours!]
  
 ----------------------------------------------------------------------------
 3: Definition of 'Hacker'
 -----------------------------

 [Editor's Note: The "RISA jihad" was in RICUS 1.03. This is a response to
  that file.]
 
 I just noticed that inane RISA jihad against "hackers".

 I'm a hacker, I do nothing wrong, and this sort of bullshit annoys me.

 A hacker is basicly a programmer who programs out of love for the
 machine/environment. Programming for its own sake. Programming as
 the ends, means, *and* justification. One who leads an e-life instead
 of an r-life. (Users don't count. Users are morons.)
 
 Granted, most people who perpetrate illegal computer-related activities 
 are hackers, merely because few others are qualified. Out of the set of
 {hackers} there is a sub-set of {criminals}. This is true of any professional
 or cultural group, even sets like {LA-cops} or {Past-Mayors-of-Providence}
 or even {Sysops-of-"ligit"-public-BBSs}. The software all you sysops are
 so worried about being broken into or abused was writen by hackers.  

 (For reference, the following is from "the jargon file", a monster
 list of hacker slang & culture that circulates the net, and is
 available in hardcopy as: _The_New_Hacker's_Dictionary_.)  

 hacker: [originally, someone who makes furniture with an axe] n.
    1. A person who enjoys exploring the details of programmable
    systems and how to stretch their capabilities, as opposed to most
    users who prefer to learn only the minimum necessary.  2. One who
    programs enthusiastically (even obsessively), or who enjoys
    programming rather than just theorizing about programming.  3. A
    person capable of appreciating {hack value}.  4. A person who
    is good at programming quickly.  5. An expert at a particular
    program, or one who frequently does work using it or on it; as in
    `a UNIX hacker'.  (Definitions 1 to 5 are correlated, and people
    who fit them congregate.)  6. An expert of any kind.  One might
    be an astronomy hacker, for example.  7. One who enjoys the
    intellectual challenge of creatively overcoming or circumventing
    limitations.  8. (deprecated) A malicious meddler who tries to
    discover sensitive information by poking around.  Hence
    `password hacker', `network hacker'.  See {cracker}. 


  That's all. Now go back to sleep.

 -dav

 -----------------------------------------------------------------------------
 4: Call Back Verifiers
 ----------------------
 
    
                By-Passing Those Darn Call Back Verifiers!
                ==========================================           
 
   Over the past few years, BBS software has matured and Call Back Verifiers
 have become common place. 
 
   Initially, one would think CBVs would put an end to fake accounts. Afterall,
 they have to disconnect, dial YOUR number, and connect to you, right?
   And once your number is divulged, it isn't much trouble to find out
  who you are, right?
  
  Wrong.  Over the past few months, certain modemers of the demented 
  persuasion have figured out how to avoid these horrid devices.
  
  The key is to keep the BBS modem (that's SUPPOSEDLY going to disconnect
  and call you back) from disconnecting.
  
  In order to do this, you need to have an actual phone as an extension
  on your data line, and relatively close to the modem.
  If your voice line IS your data line, this shouldn't be much of a problem.
  
  Step 1) Create the account, use an alias, whatever. If the Sysop is
          watchful (in other words: always by the computer), make sure
          your account appears to have a real name.
       
       2) (Fairly obvious :) Use _fake_ phone numbers. Give it a real
          prefix (first 3 digits) and area code, however. IE: 401-273-xxxx,
          location Providence, would satisfy a quick glance by most sysops.
          
       3) The system will say something like. "I am now going to hang up
          and call you back." 
          Quick! Before the BBS can disconnect, *pick up your phone*
          and *shut off your modem*, with the phone still off hook,
          turn the modem back on.
          
          Now, listen to the phone. You will either here the BBSes
          modem trying to disconnect, or dead silence.
          
          Wait a few seconds. You will either
            1) Hear kind of LOUD clicks.
            2) Hear the BBSes modem dialing out.
            3) Hear a "That call can not be completed.."
                      "You need more digits.."
                      <dialtone>, etc.
           
            In case 3, you have failed. This BBS most likely has a
           good phone line (or something) and won't allow these tricks 
           to work. Move onto another BBS.
           
           In case 1, the BBS is LOOKING for a dialtone. Hold down
           "1" on the touchtone pad. This usually fools dumb modems
           into thinking there is a dialtone. You should then hear
           the BBSes modem dialing "your" number.
           
           In case 2, the BBS thinks it has a dialtone, and is trying
           to dial you. Wait til it finishes.
           
       4) Type ATA, your modem will answer (as if it had been called
          by the BBS) and the BBS will procede, thinking it has, indeed,
          "verified" and called you back, when it never really disconnected!
          Enter your password and all that, you are validated.. with a 
          seemingly legit fake account! Congratulations!
            
       It has yet to be determined which systems are vulnerable/which are
       not. It has been noted that E-Nest BBS is *NOT* vulnerable to
       such tricks. :( How sad. 
       
       The key to this trick is keeping the connection. The majority of
       phone calls can not be hung up on unless the *Caller* hangs up
       first, or the person being called hangs up for about 90 seconds.
       
       This trick works for around 2 out of 3 BBSes.
        
     
   This trick is primarily useful for gaining access to message networks
   (ie, NE-Net, Fido-323, etc.) that are not tolerant of aliases, and
   watching them bitch, cry, and moan about how we are all no-brainers
   and stuff.
   
   This trick is also useful, of course, for obtaining more download
   credits, more game time, etc.
   
   Be smart! DON'T log in with your "fake" account after you immediately
   use up the time on your real one! It doesn't take a genius to notice
   that they're _probably_ the same person! Especially since they're
   calling at the same baud rate!
 
   Many 401 systems are vulnerable -- A list of these systems would be
   released, but it places certain sysops at an unfair advantage.
   
   Because of this vulnerability, every local network, that doesn't
   "want" aliases, is open to alias postings.
   
   Have fun guys... 
   
               CyNom     
           
 -----------------------------------------------------------------------------
 5:Idiotic Text Files Section: What to do with the Homeless
 ----------------------------------------------------------
 How to move the homeless population out of your comunity.
 
 Step (1)
  
 Find All the homeless in your community. 
 
 Step (2) 

 Set half of them on fire..
 
 Step (3) 
 
 Now employ the other half as Fighters of Homeless person Fires
 
 Step (4) 

 Now enjoy your homeless free community.

 [Editors Note: Yes, that *was* idiotic! I wouldn't normally put that in,
                but in the intererest of free expression... no matter how
                tasteless!]

 -----------------------------------------------------------------------------
 6:RI Fido Systems
 ---------------
 Here's a list of all the Fido Systems in RI, their node #'s, and their
 phones. Have fun, kiddies. All Phone #'s are 401, unless otherwise stated. 
 
 Node#       BBS Name           Comment             Phone#
 1:323/1   - The Bloom Beacon - Echo Coordinator  - 751-3831
 1:323/2   - AMPR.ORG Gate    - packet radio gw?  - Unpublished
 1:323/105 - Prometheus       - Head Fascist ;)   - 397-7522
 1:323/106 - Horses Head BBS  -                   - 726-8186
 1:323/107 - IEEE BBS         -                   - 454-2977
 1:323/108 - Data Express     -                   - (508) 336-3868
 1:323/109 - Art of the Poss. - Easy fake accts   - 421-2218
 1:323/110 - Cerebral Babylon - not on FidoNet    - 435-3576
 1:323/111 - Prime Cut BBS    -                   - 334-3096
 1:323/112 - Mise en Place    -                   - 461-2605
 1:323/113 - Adv. Voice/Data  -                   - 782-6692
 1:323/115 - ImageNet         -                   - 822-3060
 1:323/116 - FleetHQ          - doesn't xfer often- 823-0176
 1:323/118 - Connections      -                   - 658-3465
 1:323/119 - Bloom Beacon     - see 1:323/1       - 751-3831
 1:323/120 - ChowdaNet        - easy fakes/no fido- 331-0907
 1:323/121 - GAYtway          -                   - 739-1380
 1:323/122 - Nite Moves       -                   - 528-5796
 1:323/123 - 95th Floor       - not on FidoNet    - 941-7851
 1:323/124 - Signals          -                   - 823-3038
 1:323/126 - ENest            -                   - 732-5292
 1:323/128 - CommPort USA     -                   - (508) 761-9812
 1:323/131 - Behind En. Lines -                   - 463-6973
 1:323/132 - IBM World II     - always watching!! - 397-5146
 1:323/133 - CyberZone        -                   - 732-1641
 1:323/201 - BlackStone Valley-                   - 769-2055
 1:323/202 - Comp Exchange    -                   - 762-4293
 1:323/203 - Gambit           -                   - 333-6424
 1:323/204 - RI Telecomm      - an original name! - 658-2033
 1:323/205 - EyeStrain BBS    -                   - 765-6205
 1:323/206 - DataLine         - another original! - 568-6641
 1:323/302 - EarthWorld       -                   - 254-1262
 1:323/401 - Razors Edge      -                   - 364-6343
 1:323/402 - Studio II        -                   - 539-0627
   
 By "No Fidonet", we mean that the BBS doesn't seem to be actively
 participating in the FidoNet-323 echoes, and isn't really worth 
 terrorizing. 
  
 Special thanks to Squinky for abusing FrontDoor and acquiring a 
 new Nodelist for us, at 14,400 bps, no less!
 
 Note: What use is this? I thought they passworded most of the Fido 
       links! Well, yes! They did! Hint: Even *with* PWs, FD technology
       is _still_ not secure.    

 -----------------------------------------------------------------------------
 7: PedoFile.Txt 
 ---------------
 [Editor's Note: RICUS and the RICUS Editor are not responsible for the abuse
  represented by the following text. If you have any problems, take them up
  with the author, it is quite obvious who it is. I wouldn't normally put
  that in, except (again) in the interest of free expression. ]
  
  Call The Beagle's Breast BBS -
 Home TO PENET(Pedophile Net)!1!
 Over 900 Megs of Child Porn!
 Just look at some of the .gifs we have!
  
 5 year old boy with 29 year old fat guy!
 5 year old boy with TWO(yes, TWO) 20ish guys!

 PedoPhile BBS, When you want to fuck and suck little kids, you know where
 to call.
 
 Kids welcome, we always need new people to take pictures of.
 
 Also, Available, A list of BBS'ers under 12!1!, yes, you too can make them 
 give head, just like the owner's have in the past, and will do in the future.
 ------------------------------------------------------------------------------
 I know you are saying, "How Do I register? I want access to little kid's bung
 holes too!". Well, to keep up the candy we have to buy to offer to little 
 kids in exchange for sexual favors/sexual acts, we charge each user the small 
 sum of $50 a year.
 
 I know you must be thinking, "50 Dollars? That's a lot just to slam little 
 kids up the ass!", but wait, there's more! Beagle's Breast Staff will 
 PERSONALLY set up Molestation dates between you and your victims, all as part 
 of the service. And if you are ever lonely, we will come over and give you 
 head, just like little "Johny" did!
 ------------------------------------------------------------------------------
 
 Now, You must be thinking, "Oh dear, what if I get caught?". Well, don't 
 worry, Child Molestation is not a huge crime! Why, our own sysop got a seven 
 year suspended sentance simply for saying he has mental problems! 
 
 Also, as part of the Beagle's Breast service, we will help find you a good
 "Pedophile Defense" lawyer! With any luck, he will twist it around into 
 making it sound like the child FORCED you to slam your cock into their anal 
 passage! 
 ------------------------------------------------------------------------------
 
 Yes, the Beagle's Breast, PedoPhile BBS, is the bbs for all of your devient 
 sexual behaviors.  We will be happy to help you in your quest for 12 years 
 and under dick. 
 
Remember our motto, "The Beagle's Breast BBS, We Care about fuckin small boys!"
------------------------------------------------------------------------------

[ Note: Any similiarity to BBSes, people, things, networks, living, dead, or
        mythical, are  *purely* coincidental.
   
        Child Molesters are very sick individuals, and such crimes should
        not be taken lightly. ]

  
 -----------------------------------------------------------------------------
 8: Radio Scanning 
 -----------------
   
  First off: What *is* a scanner? A radio scanner is a radio reciever that
  allows you to scan a range of frequencies and pick out 'active' ones, and
  recieve/listen to them.
   
  We're not talking about your FM radio here, folks! We are talking about
  scanners that let you pick up police, fire, medical, taxi cab, amateur
  radio, cordless phone, and even cellular phone transmissions.
 
     According to a Privacy Act (1974? 1986? One of those, anyways.) It
  is illegal to listen to cellular phones. However, we here at RICUS
  embrace the policy that any frequency passing through your home and
  through your *body*  (doing who knows WHAT to it! ;) should be allowable to
  listen to. These laws are unenforcable, however, since unless you go
  open your window and shout "I listen to cellular..." no ones going to
  know.  Just remember, it IS illegal to listen to cellular frequencies
  (infact, many scanners do not allow these frequencies to be entered),
  so if (however unlikely!) you do get caught doing it for some idiotic
  reason, RICUS and it's editor(s) are not responsible.
   
      Well, first off: Get a radio scanner. You can find them in your
   local electronics store, Rat Shack, etc. or you can go mail order.
   Take a look in some of the Amateur Radio Magazines like Popular
   Communications and 73 for some mail order places.
   
     There are many different types of scanners to choose from. There are
  portable/battery powered (most, if not all portables, use rechargable
  batt. packs.) There are also "base" models, that plug into the wall. There
  are also mobile models that go permanantely in a car.
    
    I recommend the portable/handheld models... since you can carry them
  with you, put them in your car, etc. Note that in some states it's against
  the law to have scanners in your car. One could argue that it's 
  unconstitutional, idiotic, moronic, etc. but from one of the Popular
  Communications mags, this isn't the case in RI... you can have a scanner
  in your car without any problems. PopComm is a fine magazine, if your
  interested in HAM radio, shortwave, scanners. Also, try to find a scanner
  that's able to pick up many different bands (ranges of frequencies), the
  more frequencies a scanner can pick up, the cooler the stuff you can listen
  to.
  
     
    Personally, I have a BearCat 200XLT, a handheld scanner. It has 200
  memory channels. Most modern scanners have anywhere from 20 to over 1000
  memory areas. These memories allow you to store a frequency you like into
  them, for quick/easy access. Once you store all the active freqs you find in
  the memories, you can tell the scanner to only scan the channels stored in
  the memories, which allows you to keep up with all the activity in your
  area quite easily. If listening to weird things isn't your style, well...
  what can I say... you must be a normal person or something!!
 
    Once you have a scanner, you're going to want to do something with it.
  You can either read the manual and figure out how to scan ranges of
  frequencies, or you can enter frequencies from a frequency list right into
  the memories, avoiding the laborous search process. I do, however, recommend
  searching for some frequencies yourself, since I defininately don't have a
  list of ALL the freqs in use in RI, just some of them.
  
   You could buy a book with a list of radio frequencies in it and blow
  15 or 20 bucks. You'll also get a bunch of frequencies for areas all over
  the nation, most of which you'll never even use. Instead, we'll give you
  a list of some of the local RI frequencies. Here you go:
      
                   ------------------------------------------
                   Rhode Island Area Frequency List (Partial)
                   ------------------------------------------
                     [All Frequencies are listed in Mhz]
                   
        ---------------------------               
        City Police/Law Enforcement
        ---------------------------
        Barrington       155.490, 158.970
        Burrillville     154.725, 156.090, 158.970
        Central Falls    155.430, 158.970, 156.210, 155.655, 155.760
        Charlestown      154.710, 154.815, 155.190, 45.100
        Chepatchet       156.090
        Coventry         154.725, 158.970, 154.695
        Cranston         155.250, 155.970, 158.970, 482.4125, 482.4625
                         482.5825, 485.4125, 485.4625, 485.5625
        Cumberland       158.970, 155.430, 156.210, 155.655, 126.210
        East Greenwich   154.725, 155.625, 158.970
        East Providence  154.770, 155.010
        Esmond           156.090
        Exeter           154.815
        Foster           154.725, 155.190, 155.535
        Glocester        156.090
        Jamestown        39.040, 158.970
        Johnston         154.725, 155.535, 158.970, 155.185
        Lincoln          158.970, 156.210, 155.430, 156.060, 155.655       
        Middletown       155.790, 158.970
        Narragansett     154.815, 154.875, 155.190                         
        Newport          155.730
        North Kingstown  154.815, 155.190, 155.580, 158.970
        North Providence 154.725, 156.090, 156.450, 158.970, 154.800
        Pawtucket        154.830, 155.430, 155.655, 158.970
        Portsmouth       45.940 , 158.970, 155.850, 154.845
        Providence       460.275, 460.100, 460.200, 460.425, 460.325
        Scituate         39.140 , 154.725, 155.535, 156.090, 158.970
        South Kingstown  154.880, 154.815, 154.875, 158.970, 155.190
        Warwick          154.890, 155.130, 155.190, 158.970
        West Warwick     154.725, 155.190, 155.625, 156.150, 158.970
        Westerly         154.815, 155.190, 156.210
        Woonsocket       155.430, 155.655, 156.030, 158.970, 156.330
                         482.8375
        ------------   
        State Police
        ------------        
        RI State Police  155.610, 158.970, 155.505, 154.935,
                         154.905, 155.190, 155.445, 159.150
     
      
           Listen to the frequencies in your city and neighboring ones.
       Obviously, if the city is far away you're not going to be able recieve
       it very well.
        
        ----------------                  
        Fire Departments
        ----------------
        Barrington       153.950, 154.280
        Central Falls    154.280, 154.415
        Coventry          45.200,  45.480
        Cranston         154.010, 154.280
        East Greenwich   154.010, 154.310, 154.280
        East Providence  154.070, 154.280
        Esmond           154.190
        Foster           154.190, 154.290
        Jamestown        153.950, 154.190, 154.280
        Johnston         154.175, 154.190, 154.280
        Narragansett      46.420,  46.500, 154.280
        North Kingstown  154.235
        North Providence 154.250, 154.400, 33.420
        Pawtucket        154.445, 154.280
        Portsmouth       46.060
        Providence       154.370
        Scituate         154.190
        South Kingstown  46.420
        Warwick          154.310
        West Greenwich   46.380
        West Warwick     154.280, 154.430
        Westerly         46.380, 46.360, 46.500
        Woonsocket       154.130
        
        -----------------------
        Amateur Radio Repeaters
        -----------------------
        Cranston         146.700    (Ocean State Amateur Radio Group)
        Providence       146.940
        Scituate         147.300
 
        The Cranston repeater seems to be the most active. We're not sure
      of the status of the others, since the reference I'm getting these 
      frequencies from is probably out of date. 

        -----------
        Other Stuff
        -----------
        Misc. Taxi Cab Cos   152.420, 152.390, 152.450, 35.120, 152.360
                             152.330, 152.270, 152.420, 452.300, 142.150
                             31.200
       
        NOAA Weather         162.400
         
        6 Meter HAM Band     50  - 54    
        2 Meter HAM Band     144 - 148
        1 1/4 Meter HAM Band 220 - 225
        3/4 Meter HAM Band   420 - 450
                            
        Cordless Phones      46.0 - 49.0
       *Cellular Phones      806 - 821
                             851 - 866
                                     
        The HAM bands are sometimes fun to listen to. Might be fun to get
      myself a HAM license one of these days! 
      
      * Many scanners can't pick up the cellular bands. 
        However, some are able to pick up frequencies above 900 Mhz. Many
        scanners have electronics that produce "image" frequencies of 
        frequencies below them.
        For instance, my scanner lets you listen to frequencies in the 851
        to 866 Mhz cellular range by listening to frequencies in the 900
        to 915.. mhz range. You have to find out the "IF" frequency of your
        scanner (it has to be a "2 stage scanner" or something, this does
        NOT work for all scanners) and add 2 x IF to the frequency you
        want.
        Say you want freq 864 and your scanner's IF is 27 Mhz you would do
        864 + 2x27 = 918. You tune to 918 Mhz, and you will hear a slightly
        degraded version of the convo on 864. Remember: This ONLY works
        for certain types of scanners and you have to find out the IF 
        frequency!
        
             
   There you go! And if you can't figure out how to get going with 
   scanning, ask around on the local boards, and some one'll chime in and
   help you! Make sure you mention RICUS and those cool RICUS dudes...

 ----------------------------------------------------------------------------
 9: Omni-Net Information
 -----------------------
 OmniNet is a network based on FrontDoor/FidoNet technology, originating
 from southern RI. Someone though it would be cool to get the nodelist,
 conference tag names, etc. So, here they are:

 Node List:
 ----------

Zone,132,Omni-Net_Central,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,FD,TG,V32B,V42B,MNP
Region,200,N.Eastern_USA,NEUS_Control,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP
Host,401,Rhode_Island_Host,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP
Hub,10,Omega_Concern,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP
,11,Mystic_Illusion,Kingston_RI,Isaac_Rodman,1-401-782-4264,9600,CM,RG,FD,V32B,V42B,MNP
Hub,20,Morlock's_Tower,East_Greenwich_RI,Paul_Sharpe,1-401-885-2390,2400,CM,FD,RG
,21,The_95th_Floor,Cranston_RI,Paul_Mallett,1-401-941-7851,9600,CM,FD,LD,V32B,V42B
,22,Soth's_Domain,Cranston_RI,Marshall_Votta,1-401-785-0347,2400,CM,FD,TG
Hub,30,Necropolis_BBS,Charlestown_RI,Frank_Faubert,1-401-364-0524,9600,CM,FD,XA,RG,V32B,V42B
,31,The_Razor's_Edge,Richmond_RI,Chris_Arnold,1-401-364-6343,2400,CM,FD,RG
Hub,40,Death's_Doorstep,Jamestown_RI,Ed_Beaulieu,1-401-423-2964,9600,WW,V32B,V42B


  Conference Tag Names:
  ----------------------

       Short Description                              Echo Tag
 ---------------------------------------------------------------------------
     *General Discussion                             ON_GENERAL
     *Office                                         ON_OFFICE
     #Administration                                 ON_ADMIN
      SysOp Support                                  ON-SYSOP
      Poetry                                         ON-POETRY
      Music                                          ON-MUSIC
      Telecom                                        ON-TELECOM
      Programming                                    ON-PROGRAM
      RI Local News                                  ON-RILOCAL
      Literature                                     ON-LIT
      Your Ad Here                                   ON-BBSADS
      ANSI Art                                       ON-ANSI
      Entertainment                                  ON-ENTRTN
      Shadowrun                                      ON-SRUN
      Spelljammer                                    ON-SJAM
      Robotech                                       ON-ROBO
      IBM Discussion                                 ON-IBM
      Amiga Discussion                               ON-AMIGA
      For Sale/Want Ads                              ON-SALE
      Top Fives                                      ON-FIVE
      Rhode Island BBS Users Group                   ON-RIBUG
      Internet Discussion                            ON-INTERNET
      Polical Discussion/Debate                      ON-DEBATE
      Firearms                                       ON-ARMS
      Womens Issues                                  ON-WOMEN
 --------------------------------------------------------------------------- 
   * - All members MUST carry              # - Omni-Net Board Members ONLY
 ---------------------------------------------------------------------------

  [  We're not sure if the nodes use passwords or not. I see no reason to
   do anything with this info, I just put it in here cause I was asked to.
   However, if you feel the sudden urge to use this info for something,
   the same frontdoor tricks will work, of course. There will probably be
   an article on these "tricks" in a future RICUS.]

 ----------------------------------------------------------------------------
 10:Submissions to RICUS 
 -----------------------
 
    Anyone can submit an article to RICUS. Most likely, it will get distributed
 with the next issue.
  
    We'd also like to see letters to the RICUS editors. Inflammatory messages
 are always welcome!
 
  Leave public mail to "RICUS" in either Fido/323 or NE-Net, since that is
 where we primarily wait and watch the locals. <grin> 
                         
  We are _very_ interested in any info you may have on the CLAN library
 computer system. That's the one you see in the libraries, that you look
 books up on, that the librarians check books out on, etc.
     
     Also, contact us on one of those "evil subversive user" boards. If you
 don't know where they are by now, you probably never will.
 
   Seeya next issue,
                      CyNom
                      (Naturally, that's just my 'pen' handle ;)

  Note: The next issue will probably be out around March... Celebrating
        RICUS' first birthday! ONE full year of RICUS! And _atleast_
        one more to come.

  ____________________________________________________________________ 
 |  ___     __       __ |                       |                     |
 | |___) | |   |  | (_  | Rhode Island Computer | Volume 2, Issue 1   | 
 | |   \ | |__ |__| __) |  Underground Society  | January, 1993       |
 |______________________|_______________________|_____________________|