💾 Archived View for aphrack.org › issues › phrack43 › 4.gmi captured on 2021-12-03 at 14:04:38. Gemini links have been rewritten to link to archived content
View Raw
More Information
-=-=-=-=-=-=-
==Phrack Magazine==
Volume Four, Issue Forty-Three, File 4 of 27
// // /\ // ====
// // //\\ // ====
==== // // \\/ ====
/\ // // \\ // /=== ====
//\\ // // // // \=\ ====
// \\/ \\ // // ===/ ====
- *****************************************************************************
PHRACK TRIVIA
This is pretty damn hard. In fact, some of it is downright obscure.
And the bonuses? Forget about it. Answer the questions, expand the
acronyms, explain the numbers.
The five highest scorers by the next issue (or the first 5 to get
perfect scores) win COOL STUFF!
Send your answers to phrack@well.sf.ca.us
1) CCIS
2) Stimpson J. Cat's Roommate is?
3) Name the cracker.
4) METAL AE password.
5) Who invented the TeleTrial?
6) Name Bloom County's hacker.
7) What was the Whiz Kids' computer named?
8) Western Union owned what long distance service?
9) What computer read both Apple ][ and IBM PC disks?
10) Who made the "Charlie" board?
11) How many credits for a CNE?
12) What was in the trunk of the Chevy Malibu?
13) Name three bands A. Jourgensen had a hand in.
14) SYSTEST Password:
15) What computer makes the best SimStim decks?
16) What magazine brought the telephone underground to national
attention in 1971?
17) What is the significance of 1100 + 1700 hz?
18) What magazine was raided for publishing black box plans?
19) What BBS raid spawned the headlines "Whiz Kids Zap Satellites" ?
20) CLASS
21) What computer responds "OSL, Please" ?
22) RACF secures what OS?
23) The first person to create a glider gun got what?
24) QRM
25) PSS
26) What PSN was acquired by GTE Telenet?
27) 914-725-4060
28) April 15, 1943
29) 8LGM
30) WOPR
31) What happened on March 1, 1990?
32) Port 79
33) Who starred in the namesake of Neil Gorsuch's UNIX security
mailing list?
34) What Dutch scientist did research in RF monitoring?
35) What was the author of GURPS Cyberpunk better known as?
36) Who would "Piss on a spark plug if he thought it would do
any good?"
37) What thinktank did Nickie Halflinger escape from?
38) NCSC
39) Who is Pengo's favorite astronomer?
40) What language was Mitnik's favorite OS written in?
41) Abdul Alhazred wrote what?
42) The answer to it all is?
43) Who is the father of computer security?
44) Who wrote VCL?
45) What kind of computer did Cosmo have?
46) Hetfield, Ulrich, Hammet, Newstead
47) What company wrote the computer game "Hacker?"
48) Who does Tim Foley work for?
49) Who played Agent Cooper?
50) Vines runs over what OS?
51) Mr. Peabody built what?
52) Who makes SecurID?
53) What's in a Mexican Flag?
54) Who created Interzone?
55) JAMs (as led by John Dillinger)
56) Abbie Hoffman helped start what phreak magazine?
57) What was once "Reality Hackers?"
58) Gates and Allen "wrote" BASIC for what computer?
59) Tahoe is related to what OS?
60) CPE 1704 TKS is what?
61) Telemail's default was what?
62) "Do Androids Dream of Electric Sheep" became what?
63) What broadcasts between roughly 40 and 50 mhz?
64) Who created Tangram, Stratosphere, and Phaedra among others?
65) What was Flynn's most popular video game?
66) Who lived in Goose Island, Oregon?
67) 516-935-2481
68) What is the security of ComSecMilNavPac?
69) What has the "spiral death trap?"
70) Who was the Midnight Skulker?
71) TMRC
72) Who wrote "Jawbreaker?"
73) 213-080-1050
74) What is the Tetragrammaton represented as?
75) Who is Francis J. Haynes?
76) Who ran into one of the Akira test subjects?
77) What had "Munchies, Fireballs and Yllabian Space Guppies?"
78) PARC
79) Alex and his droogs hung out where?
80) Jane Chandler in DC's "Hacker Files" is based on who?
81) The Artificial Kid lives on what planet?
82) 208057040540
83) What are the two most common processors for cellular phones?
84) Who came up with the term "ICE?"
85) What group is hoped might help the "Angels" contact RMS?
86) Who is Akbar's friend?
87) What company's games was David Lightman after?
88) 26.0.0.0
89) Who was Mr. Slippery forced to locate?
90) Who is "The Whistler?"
91) What use would a 6.5536 crystal be?
92) .--. .... .-. .- -.-. -.-
93) The Dark Avenger likes what group?
94) What book spawned the term "worm?"
95) Michael in "Prime Risk" wanted money for what?
96) Automan's programmer worked for who?
97) What signal filled in keystrokes on TOPS-20?
98) ITS
99) (a/c)+121
100) What drug kept the scanners sane?
Bonus 1
3 pts Name three bodies of work by Andrew Blake.
Bonus 2
3 pts Name three currently available titles with N. L. Kuzma.
Bonus 3
4 pts Why would I hate Angel Broadhurst?
- ****************************************************************************
IF SECURITY TYPES WERE K-RAD
----------------------------------------------------------------
IRC log started Fri June 18 01:14
- ** Value of LOG set to ON
<Pat> bye peter
- ** Signoff: hackman (slavin' to da' MAN at TRW)
<Ed> Dudez, I HATE filling out thez incident Rep0rtz
<bartman> MUAHAHA Tuff J0b edd1e!
<Ed> Funni
- ** zen (zen@death.corp.sun.com) has joined channel #CERT
<Ed> re dan, just missed yer pal peety
<Pat> Hi Dan!
<zen> pal? right. ask the wife...
<venom> re
<zen> d00dz, we have SO many bugz. sux 2 be me.
- ** venom has left channel #CERT
- ** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
- ** venom has left channel #CERT
- ** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
- ** venom has left channel #CERT
- ** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
<venom> ARG!
<bartman> WTF Weitse?
<venom> s0rri
<zen> Where is everyone? Anyone seen spaf?
<Pat> I have. He was going to install something. He should be bak.
<zen> ah
- ** Action: Ed throws darts at a cracker
<zen> heh
<venom> muaha
- ** bartman is now known as Cracker
- ** Action: Cracker hacks Cert with an axe
<venom> dats a good 1
- ** Action Ed kicks cracker in the nuts
<Cracker> OUCH!
- ** Signoff: donn (Bad Link?)
<Cracker> [high voice] fuk u CERT!
<Ed> heh.
<Cracker> wonder who's on #hack? Mebbe i should go log em.
<Ed> Yeah. Oh hey, I got certbot online. Ill send it to go log.
- ** certbot (ed@cert.org) has joined channel #CERT
- ** certbot has left channel #CERT
<Ed> this will be fun.
<venom> Hey, letz deop them and take over the channel.
<zen> thats L A M E
<Cracker> Ooooh. OPWARZ! I'll go make their channel +i muahaha
- ** Cracker has left channel #CERT
- ** Casper (casper@fwi.uva.nl) has joined channel #CERT
<Casper> re all
<Venom> hey dik-head.
<zen> re
<Pat> hahahaha hi d00d.
<Casper> funni whitesey venombreath
<Ed> lame.
- ** donn (parker@bandit.sri.com) has joined channel #CERT
<donn> 'sup?
<Ed> re, oh great bald one
<donn> eat me
<zen> bahhahaha
<Pat> Now now boyz.
- ** spaf (spaf@cs.purdue.edu) has joined channel #CERT
<Pat> Spaffie!
<zen> 3l33t SPAF!
<Ed> re spaf
<spaf> Yo.
<venom> spaf...your book sucks.
<spaf> oh fuck off dutch boy.
<Casper> HEY!$!@%
- ** spaf has been kicked off channel #CERT by Casper
<venom> thx dude
<Ed> oh gawd...feetball
- ** spaf (spaf@cs.purdue.edu) has joined channel #CERT
<spaf> lame
- ** Mode change "+o -o spaf Casper" on channel #CERT by Pat
<spaf> thanks sweetie.
<Casper> op!
- ** Mode change "+o Casper" on channel #CERT by venom
<Casper> thx d00d
<Ed> Hey dan, you got those patches online?
<zen> maybe. What YOU got?
<donn> WAREZZ
<Pat> heh
<Ed> I dunno. Ill dcc you a filelist.
<zen> kool
- ** zardoz (neil@cpd.com) has joined channel #CERT
<zardoz> HEY ... anyone want to contribute to my new list?
<Ed> not me
<zen> mebbe. Whats this one called? Coredoz?
<donn> what list?
<spaf> BAH. Fuck your list man. More crackrs have them than we do!
<zardoz> who pissed in your coffee gene?
<donn> heh
- ** zardoz is now known as neil
<spaf> bah... I'm sick of those dicks using my own holes against me!
<venom> Your holes? Yer a-hole?
<Pat> What is your list about this time?
<neil> same thing. Its called REWT!
- ** neil is now known as REWT
<REWT> SEND ME YER BUGZ!@#
- ** Action: spaf sends REWT a 50 gig coredump
<Pat> :)
<REWT> u r lame.
- ** REWT is now known as neil
<Ed> I hate these reports. I wish I got to travel more.
<Pat> come see me!
<Casper> oooohhhh....netsex!
<spaf> tramp. :P
- ** bill (whmurray@dockmaster.ncsa.mil) has joined channel #CERT
<bill> word!
<Pat> hi bill.
<donn> Bill! D00d! I am gonna be in Ct. next week!
<bill> RAD! call me voice at werk. we'll thrash!
<donn> you know it!
<zen> oh puh-lease...the geriatric partiers :)
<donn> farmboy
<Ed> ***** ***** ***** *****
<Ed> * * * * *
<Ed> * *** **** *
<Ed> * * * * *
<Ed> ***** ***** * * *
<Ed>
<Ed> ***** * * * ***** ***** **
<Ed> * * * * * * * **
<Ed> **** * * * *** ***** **
<Ed> * * * * * * *
<Ed> * * ***** ***** ***** ***** **
<Pat> No DUMPING!
<zen> cert freshens your breath
<donn> ACK!
<venom> hee! certs haha
- ** ray (kaplan@bpa.arizona.edu) has joined channel #CERT
<ray> hey guys!
<Ed> ugh. Cracker lover alert.
<donn> commie
<bill> Hey ray, come to snoop for your little cracker friends?
<ray> come on, give it a rest guys.
<Pat> hi ray
<venom> ?
- ** Action: spaf spits on ray
<spaf> heh
- ** ray has been kicked off channel #CERT by spaf
- ** Mode change "+b *!*@bpa.arizona.edu" on channel #CERT by spaf
<neil> hey I wanted to talk to him about my list...
<spaf> tough shit.
<donn> heh.
- ** bartman (ddrew@opus.tymnet.com) has joined channel #CERT
<Pat> re
<Ed> how goes the takeover?
<venom> didja kick em?
<bartman> #hack is +i! muahahaha
<zen> how exciting. not
<donn> they deserve it...they are all punks.
<spaf> hmm..did you get emails? I may want to call their admins.
<bartman> nope damn.
<Ed> certbot was there. He got it.
<spaf> coolness
- ** Signoff: bill (Bad link?)
<Casper> ne1 going to hactics thing?
<venom> me
<Casper> besides you. duh.
<Ed> dunno.
<bartman> not me. I have no desire to pay for anything done by hackers
<Ed> That reminds me. Did anyone subscribe to Phrack?
<Pat> nope.
<bartman> oops. HAHAHAHAHAHA
<Ed> heh.
<donn> Whats phrak?
<neil> nope. my list is better. Who wants on it?
<Pat> me!
<donn> what list?
<Pat> OOH! I have mail! bye!
<bartman> itz an ansi bomb!
<Ed> bye Pat
<Spaf> l8r
<neil> heh.
- ** Signoff: Pat (Hugs to all)
<Casper> well, i better do something productive 2. cya
<venom> slatez d00d.
- ** Signoff: Casper (Hi ho hi ho its off to work I go)
<donn> man its late. I better go. I gotta speech in the morn
<Ed> you are getting old.
<donn> am not
<Ed> are so
<donn> am not
<Ed> are too! infinity
<donn> hasta
- ** Signoff: donn (|/dev/null)
<Ed> laterz
<Spaf> geez. what a bunch of lamers.
(ray/#CERT) UNBAN ME!
<Spaf> hahaha
<Ed> never gives up does he?
<neil> seriously ed, Ive helped you guys out, send me stuff for REWT.
<Ed> ill think about it
<spaf> not
<neil> it will be most savory. I promise. And secure!
<spaf> pfft...and monkeys might fly out of my butt
<Ed> Ill think about it.
<zen> heh, I should do one called Supernova. Exploding suns. hehe
<Ed> heh
<spaf> dats tha tr00f!
<bartman> i like my sun
<Ed> i know a bunch of crackerz who like bt's suns too.
<spaf> hahahahahahahahahaha
<venom> oh shit. Im late.
- ** Signoff: venom (LATE!)
<Ed> late 4 what?
<spaf> his vasectomy. har har
<neil> heh
- ** REVENGE (kaplan@ai.bpb.arizona.edu) has joined channel #CERT
- ** Mode change "+o REVENGE" on channel #CERT by eff.org
<Ed> whoops
- ** Mode change "+i" on channel #CERT by REVENGE
<spaf> fuCK! KICK HIM!
- ** spaf has been kicked off channel #CERT by REVENGE
- ** neil has been kicked off channel #CERT by REVENGE
- ** bartman has been kicked off channel #CERT by REVENGE
- ** Ed has been kicked off channel #CERT by REVENGE
- ** zen has been kicked off channel #CERT by REVENGE
- ** REVENGE is now known as ray
<ray> hehe
---------------------------------------------------------------------
- ***************************************************************************
Phrack Library of Periodicals
2600
Subscription Department
P.O. Box 752
Middle Island, NY 11953-0752
$21.00/Year
Animation Magazine
5889 Kanan Road, Suite 317
Agoura Hills, CA 91301
$21.00/Year
Bank Technology News
Faulkner & Gray, Inc.
Eleven Penn Plaza
New York, NY 10117-0373
$50.00/Year
Ben Is Dead
P.O. Box 3166
Hollywood, CA 90028
$20.00/Year
Boardwatch Magazine
7586 West Jewell Ave., Suite 200
Lakewood, CO 80232
$36.00/Year
Boing Boing
11288 Ventura Blvd. #818
Studio City, CA 91604
$14.00/Year
Communications of the ACM
1515 Broadway
New York, NY 10036
$30/Year
CQ - The Radio Amateur's Journal
76 North Broadway
Hicksville, NY 11801-9962
$22.95/Year
Details
P.O. Box 50246
Boulder, CO 80321
12.00/Year
Dirt
230 Park Ave
New York, NY 10169
(Supplement to Sassy & Marvel Comics)
Electronics Now
Subscription Service
P.O. Box 51866
Boulder, CO 80321-1866
$17.97/Year
Farout
9171 Wilshire Blvd. Suite 300
Beverly Hills, CA 90210
$3.95/Issue
Fate
170 Future Way
P.O. Box 1940
Marion, OH 43305-1940
$18.00/Year
Femme Fatales
P.O. Box 270
Oak Park, IL 60303
$18.00/Year
Film Threat
Subscriptions Department
P.O. Box 16928
N. Hollywood, CA 91615-9960
$11.85/Year
Film Threat Video Guide
P.O. Box 3170
Los Angeles, CA 90078-3170
$12/Year
Fringe Ware Review
P.O. Box 49921
Austin, TX 78765
$12.00/Year
Future Sex
1095 Market Street, Suite 809
San Francisco, CA 94103
$18.00/Year
Gray Areas
P.O. Box 808
Broomall, PA 19008-0808
$18.00/Year
High Times
P.O. Box 410
Mt. Morris, IL 61054
$29.95/Year
IEEE Spectrum
445 Hoes Lane
P.O. Box 1331
Piscataway, NJ 08855-1331
800-678-IEEE for info
The "I Hate Brenda" Newsletter
c/o Ben Is Dead
P.O. Box 3166
Hollywood, CA 90028
$2.00
InfoSecurity News
P.O. Box 3168
Lowell, MA 01853-3168
$40.00/Year
International UFO Library Magazine
11684 Vewntura Blvd. #708
Studio City, CA 91604
$15.00/Year
Magical Blend
1461 Valencia St. Dept. GA
San Francisco, CA 94110
$14.00/Year
Midnight Engineering
1700 Washington Ave.
Rocky Ford, CO 81067-9900
$19.95/Year
Mobile Office
Subscription Department
21800 Oxnard St. Suite 250
Woodland Hills, CA 91367-9644
$23.90/Year
Mondo 2000
P.O. Box 10171
Berkeley, CA 94709
$24.00/Year
Monitoring Times
P.O. Box 98
140 Dog Branch Road
Brasstown, NC 28902-0098
$19.95/Year
New Media
P.O. Box 1771
Riverton, NJ 08077-9771
$48.00/Year
The Nose
1095 Market Street, #812
San Francisco, CA 94103-9654
$15.00/Year
Nuts & Volts
430 Princeland Court
Corona, CA 91719-9938
$17.00/Year
Popular Communications
76 North Broadway
Hicksville, NY 11801-9962
$19.95/Year
Sassy
P.O. Box 50093
Boulder, CO 80321-0093
$9.97/Year
Security Insider Report
11511 Pine St. North
Seminole, FL 34642
$99.00/Year
SunExpert Magazine
1330 Beacon St.
Brookline, MA 02146-3202
$60.00/Year
Tech Connect
12407 MoPac Expwy. N. #100-374
Austin, TX 78758-2499
$12.00/Year
Telephone Engineer & Management
Advanstar Communications, Inc.
P.O. Box 6100
Duluoth, MN 55806-9822
$24.00/Year
UFO
1536 S. Robertson Blvd.
Los Angeles, CA 90035
$21.00/Year
Wild Cartoon Kingdom
9171 Wilshire Blvd., Suite 300
Beverly Hills, CA 90210
$3.95/Issue
Wired
P.O. Box 191826
San Francisco, CA 94119-1826
$20.00/Year
- ****************************************************************************
!!!!POST EVERYWHERE!!!!
THE WORLD'S FIRST NOVEL-ON-THE-NET (tm) SHAREWARE!!!
By Inter.Pact Press
"TERMINAL COMPROMISE"
by Winn Schwartau
A high tech thriller that comes from today's headlines!
"The Tom Clancy of computer security."
Assoc. Prof. Dr. Karen Forcht, James Madison University
"Terminal Compromise" is a highly praised novel about the inva-
sion of the United States by computer terrorists.
Since it was first published in conventional print form, (ISBN:
0-962-87000-5) it has sold extremely well world-wide, but then
again, it never hit the New York Times Bestseller List either.
But that's OK, not many do.
Recently, someone we know very well came up with a real bright
idea. They suggested that INTER.PACT Press take the unprece-
dented, and maybe slightly crazy, step to put "Terminal Compro-
mise" on the Global Network thus creating a new category for book
publishers. The idea is to offer "Terminal Compromise," and
perhaps other titles at NOVEL-ON-THE-NET SHAREWARE(tm) rates to
millions of people who just don't spend a lot of time in book-
stores. After discussions with dozens of people - maybe even
more than a hundred - we decided to do just that. We know that
we're taking a chance, but we've been convinced by hackers and
phreakers and corporate types and government representatives that
putting "Terminal Compromise" on the net would be a fabulous step
forward into the Electronic Age, (Cyberspace if you will) and
would encourage other publishers to take advantage of electronic
distribution. (It's still in the bookstores, though.)
To the best of our knowledge, no semi-sorta-kinda-legitimate
-publisher has ever put a complete pre-published 562 page book on
the network as a form of Shareware. So, I guess we're making
news as well as providing a service to the world's electronic
community. The recommended NOVEL-ON-THE-NET SHAREWARE fees are
outlined later (this is how we stay in business), so please read
on.
WE KEEP THE COPYRIGHTS!
"Terminal Compromise" is NOT being entered into the public
domain. It is being distributed electronically so hundreds
of thousands more people can enjoy it and understand just where
we are heading with our omnipresent interconnectedness and the
potential dangers we face. INTER.PACT Press maintains all copy-
rights to "Terminal Compromise" and does not, either intentionally
or otherwise, explicitly or implicitly, waive any rights to
this piece of work or recourses deemed appropriate. (Damned
lawyers.)
(C) 1991, 1992, 1993, Inter.Pact Press
TERMINAL COMPROMISE - THE REVIEWS
" . . . a must read . . ."
Digital News
"Schwartau knows about networks and security and creates an
interesting plot that will keep readers turning the pages."
Computer World
"Terminal Compromise is fast-paced and gripping. Schwartau
explains complex technology facilely and without condescension."
Government Computer News
"An incredibly fascinating tale of international intrigue . . .
action . . . characterization . . . deserves attention . . .
difficult to imagine a more comprehensive resource."
PC Laptop
"Schwartau . . . has a definite flair for intrigue and plot
twists. (He) makes it clear that the most important assets at
risk are America's right to privacy and our democratic ideals."
Personal Identification News
"I am all too familiar with the appalling realities in Mr.
Schwartau's book. (A) potentially catastrophic situation."
Chris Goggans, Ex-Legion of Doom Member.
" . . . chilling scenarios . . . ", "For light summer reading
with weighty implications . . . ", " . . . thought provoking,
sometimes chilling . . . "
Remember, it's only fiction. Or is it?
TERMINAL COMPROMISE: SYNOPSIS
"It's all about the information . . . the information."
From "Sneakers"
Taki Homosoto, silver haired Chairman of Japan's huge OSO Indus-
tries, survived Hiroshima; his family didn't. Homosoto promises
revenge against the United States before he dies. His passion-
ate, almost obsessive hatred of everything American finally comes
to a head when he acts upon his desires.
With unlimited resources, he comes up with the ultimate way to
strike back at the enemy. Miles Foster, a brilliant 33 year old
mathematician apparently isn't exactly fond of America either.
The National Security Agency wanted his skills, but his back-
ground and "family" connections kept him from advancing within the
intelligence community. His insatiable - borderline psychotic-
sex drive balances the intensity of waging war against his own
country to the highest bidder.
Scott Mason, made his fortune selling high tech toys to the
Pentagon. Now as a New York City Times reporter, Mason under-
stands both the good and the evil of technology and discovers
pieces of the terrible plot which is designed to destroy the
economy of the United States.
Tyrone Duncan, a physically huge 50-ish black senior FBI agent
who suffered through the Hoover Age indignities, befriends Scott
Mason. Tyrone provides the inside government track and confusion
from competing agencies to deal with the threats. His altruistic
and somewhat pure innate view of the world finally makes him do
the right thing.
As Homosoto's plan evolves, Arab zealots, German intelligence
agents and a host of technical mercenaries find the weaknesses in
our techno-economic infrastructure. Victims find themselves
under attack by unseen adversaries; Wall Street suffers debili-
tating blows; Ford and Chrysler endure massive shut downs. The
U.S. economy suffers a series of crushing blows.
From the White House to the Pentagon to the CIA to the National
Security Agency and FBI, a complex weaving of fascinating politi-
cal characters find themselves enmeshed a battle of the New World
Order. Sex, drugs, rock'n'roll: Tokyo, Vienna, Paris, Iraq,
Iran. It's all here.
Enjoy reading "Terminal Compromise."
SHAREWARE - NOVEL FEES:
We hope that you enjoy "Terminal Compromise" as much as everyone
else has, and that you will send us a few shekels according to
the following guidelines.
The NOVEL-ON-THE-NET SHAREWARE(tm) fees for us as a publishing
company are no different than the fees for software application
shareware publishers, and the intent is the same. So please, let
us continue this form of publishing in the future.
NOVEL-ON-THE-NET SHAREWARE Fees For The People:
The suggested donation for individuals is $7. If you hate Termi-
nal Compromise after reading it, then only send $6.50. If you're
really, really broke, then tell a hundred other people how great
it was, send us a rave review and post it where you think others
will enjoy reading it, too. If you're only a little broke, send
a few dollars. After all, this is how we stay in business. With
each registration, we will also send a FREE! issue of "Security
Insider Report," a monthly security newsletter also published by
Inter.Pact Press.
NOVEL-ON-THE-NET SHAREWARE Fees For Businesses:
We hope that you put "Terminal Compromise" on your internal
networks so that your employees will have the chance to enjoy it
as well. It's a great way to increase security awareness amongst
this country's 50,000,000 rank and file computer users. Plus,
it's a hell of a good read.
One company plans on releasing a chapter every few days
throughout its E-Mail system as a combination of security aware-
ness and employee 'perc'. Try it; it works and your employees
will appreciate it. Why? Because they'll all talk about it -
bringing security awareness to the forefront of discussion.
FEES
Distribution for up to 100 people on a single network: $ 500
(Includes 1 Year subscription to "Security Insider Report.")
Distribution for up to 1000 people on a single network: $ 3000
(Includes 10 1 Year subscriptions to "Security Insider
Report.")
Distribution for up to 2500 people on a single network: $ 6250
(Includes 1 Year electronic Corporate site license to
"Security Insider Report.")
Distribution for up to 5000 people on a single network: $ 10000
(Includes 1 Year electronic Corporate site license to
"Security Insider Report.")
Distribution for up to 10000 people on a single network: $ 15000
(Includes 1 Year electronic Corporate site license to
"Security Insider Report.")
Distribution for up to 25000 people on a single network: $ 25000
(Includes 1 Year electronic Corporate site license to
"Security Insider Report.")
Distribution for more than that - Please call and we'll figure it
out. Would you like us to coordinate a special distribution
program for you? Would you like in Postscript or other visual
formats? Give us a call and we'll see what we can do.
* * * * * * * * * *
Please DO NOT UPLOAD AND DISTRIBUTE "Terminal Compromise"
into your networks unless you intend on paying the recom-
mended fees.
* * * * * * * * * *
NOVEL-ON-THE-NET SHAREWARE Fees for Universities: FREE!
"Terminal Compromise" has been used by many schools and universi-
ties as a teaching supplement. Recognized Educational institu-
tions are entitled to use "Terminal Compromise" at NO COST, as
long as you register with us that you are doing so. Please pro-
vide: School name, address, etc., the course, the instructor, and
the reason for using it. Also, we'd like to hear from you and
tell us how it went. Thanks.
SHAREWARE-NOVEL Fees for Local, State and Federal Governments.
You have the money. :-) Please send some back by following
the same fee guidelines as those for businesses.
Government employees: You are The People - same fees are
appreciated.
* * * * * * * * * *
Agencies: Do not upload and distribute "Terminal Compromise"
unless you plan on paying the fees.
* * * * * * * * * * *
NOVEL-ON-THE-NET SHAREWARE Fees for the International Community
Make payments in $US, please.
GETTING TERMINAL COMPROMISE:
You can get your copy of Terminal Compromise from a lot of
sites; if you don't see it, just ask around. Currently the novel is
archived at the following sites:
ftp.netsys.com
/pub/novel
wuarchive.wustl.edu
/doc/misc
soda.berkeley.edu
/pub/novel
It consists of either 2 or 5 files, depending upon how you re-
ceive it. (Details at end of this file.)
Feel free to post all five files of "Terminal Compromise" any-
where on the net or on public or private BBS's as long as this
file accompanies it as well.
Please forward all NOVEL-ON-THE-NET SHAREWARE fees to:
INTER.PACT PRESS
11511 Pine St. N.
Seminole, FL., 34642
Communications:
Phn: 813-393-6600
Fax: 813-393-6361
E-Mail: p00506@psi.com
wschwartau@mcimail.com
We will accept checks, money orders, and cash if you must, and we
mean if you must. It's not the smartest thing in the world to
send cash through the mail. We are NOT equipped at this point
for credit cards.
Remember, "Terminal Compromise is copyrighted, and we will vigor-
ously pursue violations of that copyright. (Lawyers made us say
it again.)
If you ABSOLUTELY LOVE "Terminal Compromise," or find that after
50 pages of On-Screen reading, you may want a hard copy for your
bookshelf. It is available from bookstores nationwide for
$19.95, or from Inter.Pact directly for $19.95 + $3.50 shipping
and handling. If you first paid the $ 7 NOVEL-ON-THE-NET SHARE-
WARE fee, send in proof and we'll deduct $ 7 from the price of
the hard copy edition.
ISBN: 0-962-87000-5
Enjoy "Terminal Compromise" and help us make it an easy decision
to put more books on the Global Network.
Thank you in advance for your attention and your consideration.
The Publishers,
INTER.PACT Press
READING "TERMINAL COMPROMISE"
"Terminal Compromise" will come to you in one of two ways:
1) Original Distribution Format From Inter.Pact Press contains
only two -2- files.
TC_READ.ME 13,927 Bytes
That is this file you are now reading and gives an overview of
"Terminal Compromise" and how NOVEL-ON-THE-NET Shareware works.
TERMCOMP.ZIP 605,821 Bytes
This is the total content of "Terminal Compromise". Run PKUNZIP
to expand the file into four -4- readable ASCII files.
2) Some locations may choose to post "Terminal Compromise" in
readable ASCII form. There will then be four files in addition
to the TC_READ.ME file.
TERMCOMP.1 250,213 Bytes
contains the Introduction and Chapters 1 through 5.
TERMCOMP.2 337,257 Bytes
contains Chapters 6 through 14.
TERMCOMP.3 363,615 Bytes
contains Chapters 15 through 21.
TERMCOMP.4 388,515 Bytes
contains Chapters 22 through 30 and the Epilogue.
Enjoy "Terminal Compromise!" and pass it on to whomever you
think would enjoy it, too!
Thank You!
- ***************************************************************************
THE STATE OF SECURITY IN CYBERSPACE
SRI International conducted a worldwide study in 1992 of a broad range of
security issues in "cyberspace." In brief, cyberspace is the full set of
public and private communications networks in the United States and elsewhere,
including telephone or public switched telephone networks (PSTNs), packet data
networks (PDNs) of various kinds, pure computer networks, including the
Internet, and wireless communications systems, such as the cellular telephone
system. We did not address security vulnerabilities associated with
classified, secure communications networks used by and for governments.
The study was conducted as part of our ongoing research into the
vulnerabilities of various software components of cyberspace. Our approach was
to conduct research through field interviews with a broad range of experts,
including people we characterize as "good hackers," about security issues and
vulnerabilities of cyberspace and the activities of the international
"malicious hacker" community.
While the specific results of the study are proprietary to SRI, this brief
report summarizes our general conclusions for the many individuals who kindly
participated in our field interviews. As we indicated during our field
interviews, the original research for this project was not part of any other
kind of investigation, and we have not revealed the identify of any of our
respondents.
The study aimed to understand "malicious hackers," that is, people who have and
use the technical knowledge, capability, and motivation to gain unauthorized
access, for various reasons, to systems in cyberspace. It is important to
understand that by no means all hackers are malicious nor does most hacking
involve unauthorized access to cyberspace systems; indeed, only a small
fraction of computer hacking involves such activities but gives hacking an
otherwise undeserved bad reputation. While we attempted to focus on technical
(software) vulnerabilities, our interviews led us to look more at the broader
motivations and different approaches to cracking into various networks and
networked systems.
MAIN CONCLUSIONS
Our main conclusion is that social, organizational, and technological factors
still combine in ways that make much of cyberspace relatively vulnerable to
unauthorized access. The degree of vulnerability varies from one type of
communications system to another. In general, the PSTN is the least vulnerable
system, the PDNs are somewhat more vulnerable than the PSTN, the Internet is
relatively insecure, and as is widely known, the cellular phone system is the
most vulnerable of the four major areas we addressed.
The main vulnerabilities in most communications networks involves procedural,
administrative, and human weaknesses, rather than purely technical
vulnerabilities of network management, control systems, and hardware, and
software. There are technical vulnerabilities--poor system design and specific
security flaws in software--but they are mainly exploitable because of the
above problems.
Highlights of the study's conclusions include:
o Malicious attacks on most networks and networked systems cannot be completely
prevented, now or in the future. More than enough information is publicly
available to hackers and other technically-literate people to preclude attempts
at prevention of intrusions.
o It is possible individuals or groups could bring down individual systems or
related groups of systems, on purpose or by accident. However, security is
generally improving as a result of dealing with past threats and challenges to
system security. For instance, responses to the most recent serious threat to
the Internet, the so-called Internet Worm in 1989, included improved security
at sites vulnerable to this sort of worm.
o We found no evidence that the current generation of U.S. hackers is
attempting to sabotage entire networks. On the contrary, doing so is
inconsistent with the stated ethics and values of the hacker community, which
are to explore cyberspace as a purely intellectual exercise without malicious
intent or behavior. Some individuals who operate outside this informal ethical
framework, however, can and do damage specific systems and occasionally use
systems for personal gain or vindictive activities.
o There is some evidence that the newest generations of hackers, may be more
motivated by personal gain than the traditional ethic of sheer curiosity. This
development could mean that networks and networked systems could become more
likely targets for attacks by hardened criminals or governments' intelligence
services or their contractors (i.e., employing malicious hackers). This threat
does not appear to be significant today but is a possible future scenario.
o The four major areas of vulnerability uncovered in our research have little
or nothing to do with specific software vulnerabilities per se. They relate
more to the ways in which hackers can gain critical information they need in
order to exploit vulnerabilities that exist because of poor systems
administration and maintenance, unpatched "holes" in networks and systems, and
so on.
- The susceptibility of employees of businesses, public organizations, schools,
and other institutions to "social engineering" techniques
- Lax physical and procedural controls
- The widespread availability of non-proprietary and of sensitive and
proprietary information on paper about networks and computer systems
- The existence of "moles," employees of communications and computer firms and
their suppliers who knowingly provide proprietary information to hackers.
o The vulnerabilities caused by shortcomings in software-based access controls
and in hardware-related issues constitute significantly lower levels of risk
than do the four areas discussed above on more secure networks such as the PSTN
and PDNs. However, on the Internet and similar systems, software-based access
controls (for instance, password systems) constitute significant problems
because of often poor system maintenance and other procedural flaws.
RECOMMENDATIONS
Based on our research, we recommend the following:
1. Protection of organizational information and communications assets should be
improved. Issues here range from those involving overall security systems to
training employees and customers about maintenance of security on individual
systems, handling and disposition of sensitive printed information, and dealing
with "social engineering."
2. Techniques used to protect physical assets should be improved. For example,
doors and gates should be locked properly and sensitive documents and equipment
guarded appropriately.
3. Organizations and their employees should be made aware of the existence and
role of moles in facilitating and enabling hacker intrusions, and care taken in
hiring and motivating employees with the mole problem in mind.
4. Software- and hardware-based vulnerabilities should also be addressed as a
matter of course in systems design, installation and maintenance.
5. Organizations concerned with information and communications security should
proactively promote educational programs for students and parents about
appropriate computer and communications use, personal integrity and ethics, and
legitimate career opportunities in the information industry, and reward
exemplary skills, proficiency and achievements in programming and ethical
hacking.
6. Laws against malicious hacking should be fairly and justly enforced.
SRI's believes that the results of this study will provide useful information
to both the operators and users of cyberspace, including the hacker community.
We are planning to continue our research in this area during 1993 within the
same framework and conditions (i.e., anonymity of all parties and
organizations) as we conducted the 1992 research. We invite hackers and others
who are interested in participating in this work through face-to-face,
telephone or email interviews should contact one of the following members of
the SRI project team:
A. J. Bate
SRI International
Phone: 415 859 2206
Fax: 415 859 3154
Email: aj_bate@qm.sri.com,
aj@sri.com
Stuart Hauser
SRI International
Phone: 415 859 5755
Fax: 415 859 3154
Email: stuart_hauser@qm.sri.com
Tom Mandel
SRI International
Phone: 415 859 2365
FAX: 415 859 7544
Email: mandel@unix.sri.com
- ****************************************************************************```